Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup.exe

Overview

General Information

Sample name:Setup.exe
Analysis ID:1549726
MD5:6309770ca668239c93a093e885a362e2
SHA1:e6b1bafe8723468b1c191f46d2c0a21d61e896e6
SHA256:27c5187ed2c3272fadb508d182ca580e77161ed2699e53e39f151dc22cb89aef
Infos:

Detection

Score:54
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:35
Range:0 - 100

Signatures

Multi AV Scanner detection for dropped file
Creates multiple autostart registry keys
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
EXE planting / hijacking vulnerabilities found
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a global mouse hook
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • Setup.exe (PID: 1940 cmdline: "C:\Users\user\Desktop\Setup.exe" MD5: 6309770CA668239C93A093E885A362E2)
    • chrome.exe (PID: 7884 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=00000000-0000-0000-0000-D05099DB2397&winver=19042&version=fa.1092c&nocache=20241105181325.34&_fcid=1730846226315208 MD5: BB7C48CDDDE076E7EB44022520F40F77)
      • chrome.exe (PID: 6416 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-subproc-heap-profiling --field-trial-handle=2176,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2212 /prefetch:3 MD5: BB7C48CDDDE076E7EB44022520F40F77)
      • chrome.exe (PID: 8640 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=4844,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5408 /prefetch:8 MD5: BB7C48CDDDE076E7EB44022520F40F77)
      • chrome.exe (PID: 8660 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=5204,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5196 /prefetch:8 MD5: BB7C48CDDDE076E7EB44022520F40F77)
    • nsy2C04.tmp (PID: 8364 cmdline: "C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force MD5: 84EE733F8014D22DAD2DFEF725489980)
      • PcAppStore.exe (PID: 8752 cmdline: "C:\Users\user\PCAppStore\PcAppStore.exe" /init default MD5: 4B88D8ADA8D22622C30D581FC38EAA52)
        • explorer.exe (PID: 5000 cmdline: C:\Windows\Explorer.EXE MD5: 5EA66FF5AE5612F921BC9DA23BAC95F7)
          • PcAppStore.exe (PID: 4920 cmdline: "C:\Users\user\PCAppStore\PCAppStore.exe" /init default MD5: 4B88D8ADA8D22622C30D581FC38EAA52)
        • tddPFIUbTNWNQ.exe (PID: 6648 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 6180 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 4888 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 2324 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 1488 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 3292 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 5304 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 3236 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 7656 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 2796 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 4168 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 2548 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 1244 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 6448 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 1928 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 4596 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 2772 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 2784 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 2768 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 5136 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 5256 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 4812 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 1352 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 4784 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 5776 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 4844 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 8100 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 3716 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 1688 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • tddPFIUbTNWNQ.exe (PID: 6156 cmdline: "C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
      • Watchdog.exe (PID: 8820 cmdline: "C:\Users\user\PCAppStore\Watchdog.exe" /guid=00000000-0000-0000-0000-D05099DB2397 /rid=20241105181407.1816081953 /ver=fa.1092c MD5: 11F3801CB9FF046D6075F681971C4EB8)
  • svchost.exe (PID: 8472 cmdline: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc MD5: F586835082F632DC8D9404D83BC16316)
  • svchost.exe (PID: 8536 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc MD5: F586835082F632DC8D9404D83BC16316)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\PCAppStore\PCAppStore.exe" /init default, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\nsy2C04.tmp, ProcessId: 8364, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PCAppStore
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc, CommandLine: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 908, ProcessCommandLine: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc, ProcessId: 8472, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpReversingLabs: Detection: 41%
Source: C:\Users\user\PCAppStore\Uninstaller.exeReversingLabs: Detection: 29%
Source: C:\Users\user\PCAppStore\download\SetupEngine.exeReversingLabs: Detection: 18%
Source: Setup.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\nwjs\notification_helper.exeJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeEXE: C:\Users\user\PCAppStore\download\SetupEngine.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\PcAppStore.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\AutoUpdater.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\nwjs\NW_store.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\Uninstaller.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\Watchdog.exeJump to behavior
Source: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092cHTTP Parser: No favicon
Source: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092cHTTP Parser: No favicon
Source: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092cHTTP Parser: No favicon
Source: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092cHTTP Parser: No favicon
Source: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid=HTTP Parser: No favicon
Source: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid=HTTP Parser: No favicon
Source: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid=HTTP Parser: No favicon
Source: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid=HTTP Parser: No favicon
Source: https://veryfast.io/installed.php?guid=00000000-0000-0000-0000-D05099DB2397&_fcid=HTTP Parser: No favicon

Compliance

barindex
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\nwjs\notification_helper.exeJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeEXE: C:\Users\user\PCAppStore\download\SetupEngine.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\PcAppStore.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\AutoUpdater.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\nwjs\NW_store.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\Uninstaller.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpEXE: C:\Users\user\PCAppStore\Watchdog.exeJump to behavior
Source: Setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\scoped_dir7884_1956877250Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\chrome_BITS_7884_509656711Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCAppStoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\ui\static\js\2.801b9d83.chunk.js.LICENSE.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\ReadMe.txtJump to behavior
Source: Setup.exeStatic PE information: certificate valid
Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Build\Build_1092c_D20241025T171023\fa_rss\Watchdog\x64\Release\Watchdog.pdb source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmp, Watchdog.exe, 00000009.00000000.5078205769.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmp
Source: Binary string: C:\Build\Build_1092c_D20241025T171023\fa_rss\AppStoreUpdater\Release\auto_updater.pdb1 source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: tddPFIUbTNWNQ.exe, 0000000C.00000002.6490146345.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000000E.00000002.6484447698.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000000F.00000002.6487570102.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000010.00000002.6482233017.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000011.00000000.5148010650.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000012.00000000.5151662221.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000013.00000000.5154822157.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000014.00000000.5157002187.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000015.00000000.5161410807.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000016.00000000.5163919784.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000017.00000000.5165799904.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000018.00000002.6488709392.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000019.00000000.5172047362.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001A.00000002.6493456798.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001B.00000002.6486438363.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001C.00000002.6482929806.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001D.00000000.5184479193.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001E.00000000.5185943202.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000020.00000000.5192310077.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000021.00000002.6489002702.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000022.00000002.6487683792.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000023.00000000.5204704214.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000024.00000002.6492574469.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000025.00000002.6487306191.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000026.00000000.5211755599.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000027.00000000.5213333026.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000028.00000002.6485302926.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 000000
Source: Binary string: C:\Users\zak\Downloads\Inetc\Unicode\Plugins\inetc.pdb source: Setup.exe, 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Build\Build_1092c_D20241025T171023\fa_rss\engine\Release\PCAppStore.pdb source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp
Source: Binary string: C:\Build\Build_1092c_D20241025T171023\fa_rss\AppStoreUpdater\Release\auto_updater.pdb source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpCode function: 7_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_00405D74
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpCode function: 7_2_0040699E FindFirstFileW,FindClose,7_2_0040699E
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpCode function: 7_2_0040290B FindFirstFileW,7_2_0040290B
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAA75F8 FindClose,FindFirstFileExW,GetLastError,GetCurrentDirectoryW,GetLastError,8_2_00007FF64BAA75F8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAA76A8 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,8_2_00007FF64BAA76A8
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C616E0 FindClose,FindFirstFileExW,GetLastError,9_2_00007FF733C616E0
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C70330 FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_00007FF733C70330
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C61754 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,9_2_00007FF733C61754
Source: Joe Sandbox ViewIP Address: 147.182.211.77 147.182.211.77
Source: Joe Sandbox ViewIP Address: 161.35.127.181 161.35.127.181
Source: Joe Sandbox ViewIP Address: 104.248.126.225 104.248.126.225
Source: Joe Sandbox ViewIP Address: 9.9.9.9 9.9.9.9
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B93CB80 GetTickCount64,Sleep,GetTickCount,Sleep,URLDownloadToFileW,Sleep,DeleteFileW,8_2_00007FF64B93CB80
Source: explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://Realtor.com
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Setup.exe, 00000000.00000003.4651122535.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.4779654464.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4783978741.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000003.5083107402.0000000000747000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5207123401.0000000000747000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 00000009.00000002.6499776245.00000174A2803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: Setup.exe, 00000000.00000003.4651122535.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.4779654464.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4783978741.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000003.5083107402.0000000000747000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5207123401.0000000000747000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 00000009.00000002.6488879245.00000174A0B72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: Setup.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://ocsp.digicert.com0
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: explorer.exe, 0000000A.00000000.5091419532.0000000009755000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlU
Source: PcAppStore.exe, 00000008.00000003.6442017436.0000021A8D326000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6441607656.0000021A8D326000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pcapp.store/
Source: PcAppStore.exe, 00000008.00000003.6442017436.0000021A8D326000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6441607656.0000021A8D326000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pcapp.store/9
Source: PcAppStore.exe, 00000008.00000003.6442017436.0000021A8D326000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6441607656.0000021A8D326000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pcapp.store/B
Source: PcAppStore.exe, 00000008.00000003.6442017436.0000021A8D326000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6441607656.0000021A8D326000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pcapp.store/j
Source: PcAppStore.exe, 00000008.00000003.6442147558.0000021A8D217000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pcapp.store/notify_app_v2.php?guid=00000000-0000-0000-0000-D05099DB2397&lastid=802&lasttime=1
Source: PcAppStore.exe, 00000008.00000003.6442147558.0000021A8D1EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pcapp.store:80/notify_app_v2.php?guid=00000000-0000-0000-0000-D05099DB2397&lastid=802&lasttim
Source: explorer.exe, 0000000A.00000002.6510752187.0000000009EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000000.5085583496.0000000003370000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000002.6512355018.000000000C310000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
Source: PcAppStore.exe, 00000008.00000003.5366283526.0000021A8D1CD000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365634838.0000021A8D1C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://veryfast.io/
Source: PcAppStore.exe, 00000008.00000003.5366283526.0000021A8D1CD000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365634838.0000021A8D1C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://veryfast.io/8S
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F9000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D1F2000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365385051.0000021A8D282000.00000004.00000020.00020000.00000000.sdmp, Setup.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
Source: PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.certs/MicRooCerAut_2010-06-23.cr
Source: Setup.exe, 00000000.00000003.4651122535.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.4779654464.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4783978741.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000003.5083107402.0000000000747000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5207123401.0000000000747000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 00000009.00000002.6499776245.00000174A2803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
Source: explorer.exe, 0000000A.00000000.5092564302.000000000996A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6520505451.000000000F512000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5111467182.000000000F512000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
Source: explorer.exe, 0000000A.00000000.5092564302.000000000996A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp)u=
Source: explorer.exe, 0000000A.00000000.5111467182.000000000F512000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApper
Source: explorer.exe, 0000000A.00000002.6509019068.0000000009938000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5092564302.0000000009938000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirm3
Source: explorer.exe, 0000000A.00000000.5111467182.000000000F683000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6408819549.000000000F683000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
Source: explorer.exe, 0000000A.00000000.5111467182.000000000F683000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6408819549.000000000F683000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS6)
Source: explorer.exe, 0000000A.00000000.5091419532.0000000009735000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6508052285.0000000009735000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
Source: explorer.exe, 0000000A.00000000.5091419532.0000000009735000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6508052285.0000000009735000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/c
Source: explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/sports/blended?market=en-us&satoriid=fcf26e59-1c27-8bc8-206f-f8adb170f4a2&user=m
Source: explorer.exe, 0000000A.00000003.6407012970.000000000D363000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6404067678.000000000D4A9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6515256148.000000000D4AC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
Source: explorer.exe, 0000000A.00000000.5092564302.000000000996A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6509019068.000000000996A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?5
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=E36B60CB23FA4E5A968F6A0804F3FDF2&timeOut=5000&oc
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6407012970.000000000D371000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6514495395.000000000D371000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D371000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
Source: explorer.exe, 0000000A.00000000.5092564302.00000000099F6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6509019068.00000000099F6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coma
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/background/v2.0/jpg/
Source: explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/c
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/MSIAWwA=/Condition/
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/MSIAWwA=/Condition/AAehwh2.png
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/MSIAWwA=/Condition/AAehwh2.svg
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/taskbar_v10/
Source: explorer.exe, 0000000A.00000002.6508052285.0000000009755000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5091419532.0000000009755000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/20240402.1/Weather/W36_Most
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/20240908.1/Weather/W33_Clea
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA12QGBm
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA12QGBm-dark
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2C0
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2C0-dark
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gD5m
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gD5m-dark
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF7i
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF7i-dark
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhb
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhb-dark
Source: PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore/category/extensions
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=trCtrl$1
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=ukCtrl$1
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=urCtrl$2
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=viCtrl$1
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CNCtrl$1
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-TWCtrl$1
Source: PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstoreTRUOZRIWzNRUZuFnRfDSU92uFgFbJIzoe4XToBf0
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherEnabled
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlGreylist
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
Source: Watchdog.exe, 00000009.00000002.6488879245.00000174A0B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d74queuslupub.cloudfront.net/
Source: Watchdog.exe, 00000009.00000002.6488879245.00000174A0B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d74queuslupub.cloudfront.net/6
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, Watchdog.exe, 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmp, Watchdog.exe, 00000009.00000002.6488879245.00000174A0A9C000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 00000009.00000000.5078205769.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpString found in binary or memory: https://d74queuslupub.cloudfront.net/p.gif?guid=%ws&version=%ws&evt_src=watch_dog&evt_action=signal_
Source: Watchdog.exe, 00000009.00000002.6488879245.00000174A0B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d74queuslupub.cloudfront.net/p.gif?guid=00000000-0000-0000-0000-D05099DB2397&version=fa.1092
Source: Watchdog.exe, 00000009.00000002.6488879245.00000174A0B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d74queuslupub.cloudfront.net/y
Source: Setup.exe, 00000000.00000003.4779654464.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4781894379.000000000084A000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4783978741.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/
Source: Setup.exe, 00000000.00000002.4781894379.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=&evt_src=fa_mini_insta
Source: Setup.exe, 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=ersion=fa.1092c&src=pc
Source: Setup.exe, 00000000.00000002.4783809134.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=fa.1092c
Source: Setup.exe, 00000000.00000002.4781894379.000000000084A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=fa.1092c)
Source: Setup.exe, 00000000.00000002.4781894379.000000000084A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=fa.1092cT
Source: Setup.exe, 00000000.00000002.4783809134.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=fa.1092ct
Source: Setup.exe, 00000000.00000003.4779654464.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4783978741.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/rome
Source: PcAppStore.exe, 00000008.00000003.6462139913.0000021A8D2AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.p
Source: PcAppStore.exe, 00000008.00000003.6462702694.0000021A8CFDC000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/73V
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/9
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/W
Source: PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/_&
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/ies
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/mesj
Source: PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6502464680.0000021A8A8DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/p.gif?guid=00000000-0000-0000-0000-D05099DB2397&version=fa.1092c&evt_src=fa_p
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/s
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/sz
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/tes
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev.pcapp.store/tes2
Source: explorer.exe, 0000000A.00000000.5102133790.000000000D319000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6407012970.000000000D319000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.comlast_v=%ws&dl_lnk=%wsempty_instructionsno_internet_connectionend
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA18zgTq.img
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1ngK0C.img
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1rYdYW.img
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1rumdC.img
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1sK77d.img
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1tz21V.img
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1tz3Jx.img
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA36Tom.img
Source: explorer.exe, 0000000A.00000000.5091419532.0000000009784000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyxkRJ.img
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1e6XdQ.img
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1nDkpC.img
Source: Watchdog.exe, 00000009.00000002.6488879245.00000174A0B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myactivity.google.com/
Source: Setup.exe, 00000000.00000003.4651122535.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.4779654464.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4783978741.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000003.5083107402.0000000000747000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5207123401.0000000000747000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 00000009.00000002.6499776245.00000174A2803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: explorer.exe, 0000000A.00000000.5102133790.000000000D319000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6407012970.000000000D319000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
Source: explorer.exe, 0000000A.00000000.5082921191.0000000000F43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://outlook.comz
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passwords.google.com
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passwords.google.comGoogle
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passwords.google.comT
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/
Source: nsy2C04.tmp, 00000007.00000002.5211071511.0000000003AB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/-
Source: Setup.exe, 00000000.00000002.4783809134.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/-end-point:
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/?p=lpd_appstore-faq
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/O
Source: nsy2C04.tmp, 00000007.00000002.5211071511.0000000003AB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/Windows
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/_
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.store/account/login
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.store/account/logintray_exitinvalid
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.store/cpg_fa.php?guid=An
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.store/dl_cta_open.php?guid=%ws&oid=%lu&entryApp=%ws
Source: PcAppStore.exe, 00000008.00000003.5366283526.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365634838.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/dl_cta_open.php?guid=%ws&oid=%lu&entryApp=%ws:Sunday:Mon:Monday:T
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/e/
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/e/G
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/fa_version.php?guid=%ws&end_v=%ws&nocache=%d
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/fa_version.php?guid=%ws&res=link&nocache=%d
Source: nsy2C04.tmp, 00000007.00000002.5206602405.00000000006CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/inst_cpg.php?guid=&src=pcapp_full.
Source: Setup.exe, 00000000.00000002.4783809134.0000000002C50000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.4651122535.0000000002C7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/inst_cpg.php?guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&ve
Source: nsy2C04.tmp, 00000007.00000002.5207123401.0000000000747000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/inst_cpg.php?guid=00000000-0000-0000-0000-D05099DB2397&version=fa.1092c&src=pcap
Source: Setup.exe, 00000000.00000002.4781894379.0000000000815000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5206602405.00000000006CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/installing.php?guid=&winver=
Source: Setup.exe, 00000000.00000002.4783978741.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/installing.php?guid=00000000-0000-0000-0000-D05099DB2397&winver=19042&version=fa
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.store/notify_app_v2.php?guid=&lastid=&lasttime=&nocache=&end_v=%ws%ws%ws%d%ws%d%ws%ws%
Source: PcAppStore.exe, 00000008.00000003.6462702694.0000021A8D009000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/notify_app_v2.php?guid=00000000-0000-0000-0000-D05099DB2397&lastid=802&lasttime=
Source: PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.store/pixel.gif
Source: Setup.exe, 00000000.00000003.4779654464.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4784086006.0000000002CFC000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.4779845715.0000000002CFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixel.gif?
Source: PcAppStore.exeString found in binary or memory: https://pcapp.store/pixel.gif?guid=
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_&evt_action=&nocache=%s%s%s%s%s%s%s%s&%s%s%I
Source: nsy2C04.tmp, 00000007.00000002.5206602405.00000000006CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_installer&evt_action=localmac
Source: Setup.exe, 00000000.00000003.4779545393.0000000002D1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixel.gif?guid=00000000-0000-0000-0000-D05099DB2397&version=
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D18A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixel.gif?guid=00000000-0000-0000-0000-D05099DB2397&version=fa.1092c&evt_src=fa_
Source: nsy2C04.tmp, 00000007.00000002.5211071511.0000000003A40000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5211071511.0000000003A96000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5211071511.0000000003A93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixel.gif?guid=00000000-0000-0000-0000-D05099DB2397&version=fa.1092c&inst_parent
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.store/pixel.gifcurrent_path()
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.store/pixel.gifinvalid
Source: nsy2C04.tmp, 00000007.00000002.5206602405.00000000006CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/privacy.html?guid=By
Source: Setup.exe, 00000000.00000002.4781894379.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/privacy.html?guid=welhttps://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_min
Source: Setup.exe, 00000000.00000002.4783809134.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/q
Source: Setup.exe, 00000000.00000002.4781894379.0000000000815000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5206602405.00000000006CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/tos.html?guid=
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://pcapp.storenamepathmicrosoftIdregpathkeydisplaycountblinkingnotificationIconrunParampathalt_
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcappstore.s3.amazonaws.com/versionrinstruction_failed%ws?guid=%ws&nocache=%dauto_updater.ex
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://photos.google.com/settings?referrer=CHROME_NTP
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://policies.google.com/
Source: explorer.exe, 0000000A.00000000.5111467182.000000000F683000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6408819549.000000000F683000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comEM
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://prod-streaming-video-msn-com.akamaized.net/v1/eus004/1e6c9709-e4c4-4692-80a9-9f6302e7053f/c3
Source: explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://prod-streaming-video-msn-com.akamaized.net/v1/eus004/86e79907-6fc4-4a38-baf6-17ed38b79139/36
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://prod-video-cms-amp-microsoft-com.akamaized.net/tenant/amp/entityid/AA1tyUCX?blobrefkey=close
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://repcdn.veryfast.io/
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://repcdn.veryfast.io/S$
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://repcdn.veryfast.io/download/2.349/Setup.exe
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://repcdn.veryfast.io/download/2.349/Setup.exeLocationETagAuthentication-InfoAgeAccept-RangesLa
Source: PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D18A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://repcdn.veryfast.io/download/2.349/Setup.exeQ
Source: PcAppStore.exeString found in binary or memory: https://search.pcapp.store/r.html?q=%ws&br=%ws&en=%ws&guid=%ws&end_v=%ws
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://search.pcapp.store/r.html?q=%ws&br=%ws&en=%ws&guid=%ws&end_v=%wsatlTraceGeneralatlTraceCOMat
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://stacker.com/lifestyle/truth-behind-5-unconventional-self-care-rituals-have-gone-viral-tiktok
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://stacker.com/stories
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/a/answer/9122284
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/answer/6098869
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chromebook?p=app_intent
Source: PcAppStore.exe, 00000008.00000003.5366283526.0000021A8D1CD000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365634838.0000021A8D1C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://veryfast.io/
Source: PcAppStore.exe, 00000008.00000003.5366283526.0000021A8D1CD000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365634838.0000021A8D1C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://veryfast.io/NS
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D136000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://veryfast.io/download.php?guid=00000000-0000-0000-0000-D05099
Source: PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://veryfast.io/download.php?guid=00000000-0000-0000-0000-D05099DB2397&version=last
Source: PcAppStore.exe, 00000008.00000003.5366283526.0000021A8D1CD000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365634838.0000021A8D1C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://veryfast.io/j
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-us&chosenMarketReason=implicitNew
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-us&chosenMarketReason=implicitNew
Source: explorer.exe, 0000000A.00000000.5111467182.000000000F683000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6408819549.000000000F683000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5111467182.000000000F825000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
Source: explorer.exe, 0000000A.00000000.5102133790.000000000D319000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6407012970.000000000D319000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comZ
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.businessinsider.com/real-estate-top-cities-home-prices-affordability-inventory-mortgage-
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.businessinsider.com/real-estate-us-housing-market-down-payments-mortgage-rates-realtor-2
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.html
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.html&
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlT&r
Source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlYar&d
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/feed
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/foodanddrink/recipes/i-asked-3-butchers-how-to-choose-the-best-steak-they-
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/health/wellness/75-things-under-15-on-amazon-prime-that-are-legitimately-a
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/companies/bernie-marcus-the-home-depot-co-founder-and-billionaire-ph
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/retirement/5-big-social-security-changes-for-2025-how-many-will-impa
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/music/news/minneapolis-musician-tyka-nelson-prince-s-sister-and-only-full-
Source: explorer.exe, 0000000A.00000000.5091419532.0000000009700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6508052285.0000000009706000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/6-things-to-watch-for-when-kamala-harris-debates-donald-trum
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exit-polls-2024-fears-for-american-democracy-economic-discon
Source: explorer.exe, 0000000A.00000002.6508052285.0000000009784000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5091419532.0000000009784000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/jd-vance-spreads-outrageous-lie-about-haitian-immigrants/ar-
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/obama-urges-patience-with-election-results-it-takes-time-to-
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-vance-host-election-night-watch-party-in-palm-beach-fl
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/us-voters-cast-ballots-in-tight-race-as-turbulent-campaign-n
Source: explorer.exe, 0000000A.00000002.6508052285.0000000009706000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technolog
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/scientists-say-they-know-how-the-universe-will-end/ar-AA1s
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/after-188-years-the-world-s-longest-venomous-snake-is-officiall
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/israel-s-netanyahu-fires-defense-minister-gallant/ar-AA1tyHVG
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/ukraine-war-latest-kyiv-confirms-first-battles-between-ukrainia
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/western-officials-suspect-russia-was-behind-a-plot-to-put-incen
Source: explorer.exe, 0000000A.00000000.5091419532.00000000097DB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6402308586.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6508585869.00000000097DB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/play/games/cut-the-rope/cg-9npxcz4n8jw7
Source: explorer.exe, 0000000A.00000000.5091419532.0000000009700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6508052285.0000000009706000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/play/games/fruit-chopper/cg-9n8wl40938mq
Source: explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/play/games/piece-of-cake/cg-9n5mln8fpwg8
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D216000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.oracle.com/technetwork/java/javase/downloads09Dg
Source: PcAppStore.exe, 00000008.00000003.6389453202.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6442147558.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.oracle.com/technetwork/java/javase/downloadsG
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056DE
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindows user hook set: 0 mouse low level C:\Users\user\PCAppStore\PcAppStore.exeJump to behavior
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpCode function: 7_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,7_2_00403640
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040755C0_2_0040755C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406D850_2_00406D85
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpCode function: 7_2_00406D5F7_2_00406D5F
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAF12748_2_00007FF64BAF1274
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B9295B08_2_00007FF64B9295B0
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACAC588_2_00007FF64BACAC58
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAF0BD88_2_00007FF64BAF0BD8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAE2B948_2_00007FF64BAE2B94
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACAA548_2_00007FF64BACAA54
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACB0688_2_00007FF64BACB068
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAEF0088_2_00007FF64BAEF008
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAE0F488_2_00007FF64BAE0F48
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B900F208_2_00007FF64B900F20
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACAE648_2_00007FF64BACAE64
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACC3D88_2_00007FF64BACC3D8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACC75C8_2_00007FF64BACC75C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAE1A5C8_2_00007FF64BAE1A5C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACD9848_2_00007FF64BACD984
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAE00EC8_2_00007FF64BAE00EC
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACDD888_2_00007FF64BACDD88
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACB4788_2_00007FF64BACB478
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAE13DC8_2_00007FF64BAE13DC
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BACB2748_2_00007FF64BACB274
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAA76A88_2_00007FF64BAA76A8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAD55608_2_00007FF64BAD5560
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C68CD09_2_00007FF733C68CD0
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C6E45C9_2_00007FF733C6E45C
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C723C09_2_00007FF733C723C0
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C703309_2_00007FF733C70330
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C76AB89_2_00007FF733C76AB8
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C6D9489_2_00007FF733C6D948
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C690E89_2_00007FF733C690E8
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C7285C9_2_00007FF733C7285C
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C6C7C49_2_00007FF733C6C7C4
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C69F209_2_00007FF733C69F20
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C617549_2_00007FF733C61754
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C68EDC9_2_00007FF733C68EDC
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C6DDDC9_2_00007FF733C6DDDC
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C5ED509_2_00007FF733C5ED50
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: String function: 00007FF64B8B11A0 appears 403 times
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: String function: 00007FF64B8B0F30 appears 88 times
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: String function: 00007FF64B8BFCC0 appears 57 times
Source: NW_store.exe.7.drStatic PE information: Number of sections : 13 > 10
Source: nw.dll.7.drStatic PE information: Number of sections : 15 > 10
Source: vk_swiftshader.dll.7.drStatic PE information: Number of sections : 11 > 10
Source: ffmpeg.dll.7.drStatic PE information: Number of sections : 11 > 10
Source: libEGL.dll.7.drStatic PE information: Number of sections : 12 > 10
Source: node.dll.7.drStatic PE information: Number of sections : 11 > 10
Source: vulkan-1.dll.7.drStatic PE information: Number of sections : 11 > 10
Source: nw_elf.dll.7.drStatic PE information: Number of sections : 14 > 10
Source: libGLESv2.dll.7.drStatic PE information: Number of sections : 12 > 10
Source: notification_helper.exe.7.drStatic PE information: Number of sections : 13 > 10
Source: Setup.exe, 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameinetc.dllF vs Setup.exe
Source: Setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal54.spyw.evad.winEXE@40/270@0/36
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B8B8790 GetLastError,FormatMessageW,8_2_00007FF64B8B8790
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpCode function: 7_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,7_2_00403640
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040498A
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C5DBA0 CreateToolhelp32Snapshot,Process32FirstW,CloseHandle,CloseHandle,Process32NextW,CloseHandle,9_2_00007FF733C5DBA0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B951860 FindResourceExW,LoadResource,LockResource,SizeofResource,GlobalAlloc,GlobalLock,GlobalUnlock,CreateStreamOnHGlobal,GetLastError,8_2_00007FF64B951860
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\scoped_dir7884_1956877250Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStoreJump to behavior
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsz155D.tmpJump to behavior
Source: Setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT sql FROM%d UNION ALL SELECT shell_add_schema(sql,mainNULL,name) AS sql, type, tbl_name, name, rowid, AS snum, AS sname FROM .sqlite_schema UNION ALL SELECT shell_module_schema(name), 'table', name, name, name, 9e+99, 'main' FROM pragma_module_list) WHERE %Qlower(printf('%s.%s',sname,tbl_name))lower(tbl_name) GLOB LIKE ESCAPE '\' AND name NOT LIKE 'sqlite_%%' AND sql IS NOT NULL ORDER BY snum, rowidSQL: %s;
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: INSERT INTO sqlite_schema(type,name,tbl_name,rootpage,sql)VALUES('table','%q','%q',0,'%q');%s
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT max(length(key)) FROM temp.sqlite_parameters;
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: CREATE TABLE ColNames( cpos INTEGER PRIMARY KEY, name TEXT, nlen INT, chop INT, reps INT, suff TEXT);CREATE VIEW RepeatedNames AS SELECT DISTINCT t.name FROM ColNames t WHERE t.name COLLATE NOCASE IN ( SELECT o.name FROM ColNames o WHERE o.cpos<>t.cpos);
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT type,name,tbl_name,sql FROM sqlite_schema ORDER BY name;
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT key, quote(value) FROM temp.sqlite_parameters;
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT 'CREATE TEMP' || substr(sql, 7) FROM sqlite_schema WHERE tbl_name = %Q AND type IN ('table', 'trigger') ORDER BY type;
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: INSERT INTO selftest(tno,op,cmd,ans) SELECT rowid*10,op,cmd,ans FROM [_shell$self];
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT * FROM "%w" ORDER BY rowid DESC;Warning: cannot step "%s" backwardsSELECT name, sql FROM sqlite_schema WHERE %sError: (%d) %s on [%s]
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: INSERT INTO sqlite_schema(type,name,tbl_name,rootpage,sql)VALUES('table','%q','%q',0,'%q');
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT * FROM "%w" ORDER BY rowid DESC;
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT tbl,idx,stat FROM sqlite_stat1 ORDER BY tbl,idx;
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT 'EXPLAIN QUERY PLAN SELECT 1 FROM ' || quote(s.name) || ' WHERE ' || group_concat(quote(s.name) || '.' || quote(f.[from]) || '=?' || fkey_collate_clause( f.[table], COALESCE(f.[to], p.[name]), s.name, f.[from]),' AND '), 'SEARCH ' || s.name || ' USING COVERING INDEX*(' || group_concat('*=?', ' AND ') || ')', s.name || '(' || group_concat(f.[from], ', ') || ')', f.[table] || '(' || group_concat(COALESCE(f.[to], p.[name])) || ')', 'CREATE INDEX ' || quote(s.name ||'_'|| group_concat(f.[from], '_')) || ' ON ' || quote(s.name) || '(' || group_concat(quote(f.[from]) || fkey_collate_clause( f.[table], COALESCE(f.[to], p.[name]), s.name, f.[from]), ', ') || ');', f.[table] FROM sqlite_schema AS s, pragma_foreign_key_list(s.name) AS f LEFT JOIN pragma_table_info AS p ON (pk-1=seq AND p.arg=f.[table]) GROUP BY s.name, f.id ORDER BY (CASE WHEN ? THEN f.[table] ELSE s.name END)
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT 'CREATE TEMP' || substr(sql, 7) FROM sqlite_schema WHERE tbl_name = %Q AND type IN ('table', 'trigger') ORDER BY type;ALTER TABLE temp.%Q RENAME TO %QINSERT INTO %Q VALUES(, %s?)UPDATE %Q SET , %s%Q=?DELETE FROM %QSELECT type, name, sql, 1 FROM sqlite_schema WHERE type IN ('table','view') AND name NOT LIKE 'sqlite_%%' UNION ALL SELECT type, name, sql, 2 FROM sqlite_schema WHERE type = 'trigger' AND tbl_name IN(SELECT name FROM sqlite_schema WHERE type = 'view') ORDER BY 4, 1CREATE TABLE x(, %s%Q COLLATE %s)CREATE VIRTUAL TABLE %Q USING expert(%Q)SELECT max(i.seqno) FROM sqlite_schema AS s, pragma_index_list(s.name) AS l, pragma_index_info(l.name) AS i WHERE s.type = 'table', %sx.%Q IS rem(%d, x.%Q) COLLATE %s%s%dSELECT %s FROM %Q x ORDER BY %sSELECT %s FROM temp.t592690916721053953805701627921227776 x ORDER BY %s%d %dDROP TABLE IF EXISTS temp.t592690916721053953805701627921227776CREATE TABLE temp.t592690916721053953805701627921227776 AS SELECT * FROM %QSELECT s.rowid, s.name, l.name FROM sqlite_schema AS s, pragma_index_list(s.name) AS l WHERE s.type = 'table'SELECT name, coll FROM pragma_index_xinfo(?) WHERE keyINSERT INTO sqlite_stat1 VALUES(?, ?, ?)ANALYZE; PRAGMA writable_schema=1remsampleDROP TABLE IF EXISTS temp.t592690916721053953805701627921227776ANALYZE sqlite_schemaDROP TABLE IF EXISTS temp.t592690916721053953805701627921227776:memory::memory:SELECT sql FROM sqlite_schema WHERE name NOT LIKE 'sqlite_%%' AND sql NOT LIKE 'CREATE VIRTUAL %%'Cannot find a unique index name to propose. -- stat1: %s;%s%s
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: INSERT OR IGNORE INTO "%s" VALUES(?,?);Error %d: %s on [%s]
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077211245.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5190145425.00007FF64BB52000.00000008.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201884745.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpBinary or memory string: SELECT name,seq FROM sqlite_sequence ORDER BY name;
Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\user\Desktop\Setup.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Setup.exe "C:\Users\user\Desktop\Setup.exe"
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=00000000-0000-0000-0000-D05099DB2397&winver=19042&version=fa.1092c&nocache=20241105181325.34&_fcid=1730846226315208
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-subproc-heap-profiling --field-trial-handle=2176,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2212 /prefetch:3
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=4844,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5408 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=5204,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5196 /prefetch:8
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\nsy2C04.tmp "C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess created: C:\Users\user\PCAppStore\PcAppStore.exe "C:\Users\user\PCAppStore\PcAppStore.exe" /init default
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess created: C:\Users\user\PCAppStore\Watchdog.exe "C:\Users\user\PCAppStore\Watchdog.exe" /guid=00000000-0000-0000-0000-D05099DB2397 /rid=20241105181407.1816081953 /ver=fa.1092c
Source: C:\Windows\explorer.exeProcess created: C:\Users\user\PCAppStore\PcAppStore.exe "C:\Users\user\PCAppStore\PCAppStore.exe" /init default
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=00000000-0000-0000-0000-D05099DB2397&winver=19042&version=fa.1092c&nocache=20241105181325.34&_fcid=1730846226315208Jump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\nsy2C04.tmp "C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /forceJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-subproc-heap-profiling --field-trial-handle=2176,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2212 /prefetch:3Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=4844,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5408 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=5204,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5196 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess created: C:\Users\user\PCAppStore\PcAppStore.exe "C:\Users\user\PCAppStore\PcAppStore.exe" /init default Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess created: C:\Users\user\PCAppStore\Watchdog.exe "C:\Users\user\PCAppStore\Watchdog.exe" /guid=00000000-0000-0000-0000-D05099DB2397 /rid=20241105181407.1816081953 /ver=fa.1092cJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\explorer.exeProcess created: C:\Users\user\PCAppStore\PcAppStore.exe "C:\Users\user\PCAppStore\PCAppStore.exe" /init default
Source: C:\Windows\explorer.exeProcess created: unknown unknown
Source: C:\Windows\explorer.exeProcess created: unknown unknown
Source: C:\Windows\explorer.exeProcess created: unknown unknown
Source: C:\Windows\explorer.exeProcess created: unknown unknown
Source: C:\Users\user\Desktop\Setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.shell.servicehostbuilder.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mlang.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ngcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: authz.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: tbs.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ngcctnrsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: tbs.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ngcctnrgidshandler.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ktmw32.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ngcctnr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: edgegdi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wlanapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: uiamanager.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windows.shell.servicehostbuilder.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: apphelp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: urlmon.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: winhttp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: iertutil.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: srvcli.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: netutils.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: edgegdi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: windows.storage.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: wldp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: uxtheme.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: wininet.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: sspicli.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: profapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: mswsock.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: iphlpapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: winnsi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: dnsapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: rasadhlp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: fwpuclnt.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: schannel.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: mskeyprotect.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: ntasn1.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: msasn1.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: dpapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: cryptsp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: rsaenh.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: cryptbase.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: gpapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: ncrypt.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: ncryptsslp.dll
Source: C:\Windows\explorer.exeSection loaded: cdprt.dll
Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dll
Source: C:\Windows\explorer.exeSection loaded: icu.dll
Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dll
Source: C:\Windows\explorer.exeSection loaded: pcacli.dll
Source: C:\Windows\explorer.exeSection loaded: mpr.dll
Source: C:\Windows\explorer.exeSection loaded: sfc_os.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dll
Source: C:\Windows\explorer.exeSection loaded: msvcp140.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dll
Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dll
Source: C:\Windows\explorer.exeSection loaded: dlnashext.dll
Source: C:\Windows\explorer.exeSection loaded: wpdshext.dll
Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dll
Source: C:\Windows\explorer.exeSection loaded: storageusage.dll
Source: C:\Windows\explorer.exeSection loaded: fhcfg.dll
Source: C:\Windows\explorer.exeSection loaded: efsutil.dll
Source: C:\Windows\explorer.exeSection loaded: dsrole.dll
Source: C:\Windows\explorer.exeSection loaded: windows.internal.system.userprofile.dll
Source: C:\Windows\explorer.exeSection loaded: cloudexperiencehostbroker.dll
Source: C:\Windows\explorer.exeSection loaded: credui.dll
Source: C:\Windows\explorer.exeSection loaded: dui70.dll
Source: C:\Windows\explorer.exeSection loaded: wdscore.dll
Source: C:\Windows\explorer.exeSection loaded: dbghelp.dll
Source: C:\Windows\explorer.exeSection loaded: dbgcore.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dll
Source: C:\Windows\explorer.exeSection loaded: msvcp140.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: urlmon.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: iertutil.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: srvcli.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: netutils.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: version.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wlanapi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: iphlpapi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: winhttp.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dwmapi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wtsapi32.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: secur32.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: profapi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: sspicli.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: edgegdi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wbemcomn.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: amsi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: userenv.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeSection loaded: oleacc.dll
Source: C:\Users\user\Desktop\Setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: PC App Store.lnk.7.drLNK file: ..\..\..\..\..\..\PCAppStore\PcAppStore.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\scoped_dir7884_1956877250Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\chrome_BITS_7884_509656711Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCAppStoreJump to behavior
Source: Setup.exeStatic PE information: certificate valid
Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Build\Build_1092c_D20241025T171023\fa_rss\Watchdog\x64\Release\Watchdog.pdb source: nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmp, Watchdog.exe, 00000009.00000000.5078205769.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmp
Source: Binary string: C:\Build\Build_1092c_D20241025T171023\fa_rss\AppStoreUpdater\Release\auto_updater.pdb1 source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: tddPFIUbTNWNQ.exe, 0000000C.00000002.6490146345.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000000E.00000002.6484447698.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000000F.00000002.6487570102.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000010.00000002.6482233017.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000011.00000000.5148010650.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000012.00000000.5151662221.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000013.00000000.5154822157.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000014.00000000.5157002187.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000015.00000000.5161410807.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000016.00000000.5163919784.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000017.00000000.5165799904.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000018.00000002.6488709392.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000019.00000000.5172047362.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001A.00000002.6493456798.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001B.00000002.6486438363.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001C.00000002.6482929806.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001D.00000000.5184479193.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 0000001E.00000000.5185943202.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000020.00000000.5192310077.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000021.00000002.6489002702.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000022.00000002.6487683792.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000023.00000000.5204704214.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000024.00000002.6492574469.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000025.00000002.6487306191.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000026.00000000.5211755599.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000027.00000000.5213333026.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 00000028.00000002.6485302926.0000000000A7E000.00000002.00000001.01000000.00000019.sdmp, tddPFIUbTNWNQ.exe, 000000
Source: Binary string: C:\Users\zak\Downloads\Inetc\Unicode\Plugins\inetc.pdb source: Setup.exe, 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Build\Build_1092c_D20241025T171023\fa_rss\engine\Release\PCAppStore.pdb source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp
Source: Binary string: C:\Build\Build_1092c_D20241025T171023\fa_rss\AppStoreUpdater\Release\auto_updater.pdb source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B90BFE0 RoGetActivationFactory,LoadLibraryW,GetProcAddress,RoGetActivationFactory,LoadLibraryW,GetProcAddress,8_2_00007FF64B90BFE0
Source: Setup.exeStatic PE information: real checksum: 0x3937f should be: 0x3331d
Source: NW_store.exe.7.drStatic PE information: real checksum: 0x0 should be: 0x23ab08
Source: Math.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x155a8
Source: System.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x3d68
Source: System.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x3d68
Source: vk_swiftshader.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x44caa7
Source: nsJSON.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x6718
Source: ffmpeg.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x1f8136
Source: inetc.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x13c41
Source: NSISFastLib.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x30512
Source: libEGL.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x7ddc6
Source: vulkan-1.dll.7.drStatic PE information: real checksum: 0x0 should be: 0xe0b14
Source: nw_elf.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x124d11
Source: NSISFastLib.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x30512
Source: libGLESv2.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x7b9652
Source: nsJSON.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x6718
Source: inetc.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x13c41
Source: notification_helper.exe.7.drStatic PE information: real checksum: 0x0 should be: 0x11edb8
Source: nsDialogs.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x2f9b
Source: NW_store.exe.7.drStatic PE information: section name: .gxfg
Source: NW_store.exe.7.drStatic PE information: section name: .retplne
Source: NW_store.exe.7.drStatic PE information: section name: .voltbl
Source: NW_store.exe.7.drStatic PE information: section name: CPADinfo
Source: NW_store.exe.7.drStatic PE information: section name: _RDATA
Source: NW_store.exe.7.drStatic PE information: section name: malloc_h
Source: ffmpeg.dll.7.drStatic PE information: section name: .gxfg
Source: ffmpeg.dll.7.drStatic PE information: section name: .retplne
Source: ffmpeg.dll.7.drStatic PE information: section name: .voltbl
Source: ffmpeg.dll.7.drStatic PE information: section name: _RDATA
Source: libEGL.dll.7.drStatic PE information: section name: .gxfg
Source: libEGL.dll.7.drStatic PE information: section name: .retplne
Source: libEGL.dll.7.drStatic PE information: section name: .voltbl
Source: libEGL.dll.7.drStatic PE information: section name: _RDATA
Source: libEGL.dll.7.drStatic PE information: section name: malloc_h
Source: libGLESv2.dll.7.drStatic PE information: section name: .gxfg
Source: libGLESv2.dll.7.drStatic PE information: section name: .retplne
Source: libGLESv2.dll.7.drStatic PE information: section name: .voltbl
Source: libGLESv2.dll.7.drStatic PE information: section name: _RDATA
Source: libGLESv2.dll.7.drStatic PE information: section name: malloc_h
Source: node.dll.7.drStatic PE information: section name: .gxfg
Source: node.dll.7.drStatic PE information: section name: .retplne
Source: node.dll.7.drStatic PE information: section name: .voltbl
Source: node.dll.7.drStatic PE information: section name: _RDATA
Source: notification_helper.exe.7.drStatic PE information: section name: .gxfg
Source: notification_helper.exe.7.drStatic PE information: section name: .retplne
Source: notification_helper.exe.7.drStatic PE information: section name: .voltbl
Source: notification_helper.exe.7.drStatic PE information: section name: CPADinfo
Source: notification_helper.exe.7.drStatic PE information: section name: _RDATA
Source: notification_helper.exe.7.drStatic PE information: section name: malloc_h
Source: nw.dll.7.drStatic PE information: section name: .gxfg
Source: nw.dll.7.drStatic PE information: section name: .retplne
Source: nw.dll.7.drStatic PE information: section name: .rodata
Source: nw.dll.7.drStatic PE information: section name: .voltbl
Source: nw.dll.7.drStatic PE information: section name: CPADinfo
Source: nw.dll.7.drStatic PE information: section name: LZMADEC
Source: nw.dll.7.drStatic PE information: section name: _RDATA
Source: nw.dll.7.drStatic PE information: section name: malloc_h
Source: nw_elf.dll.7.drStatic PE information: section name: .crthunk
Source: nw_elf.dll.7.drStatic PE information: section name: .gxfg
Source: nw_elf.dll.7.drStatic PE information: section name: .retplne
Source: nw_elf.dll.7.drStatic PE information: section name: .voltbl
Source: nw_elf.dll.7.drStatic PE information: section name: CPADinfo
Source: nw_elf.dll.7.drStatic PE information: section name: _RDATA
Source: nw_elf.dll.7.drStatic PE information: section name: malloc_h
Source: vk_swiftshader.dll.7.drStatic PE information: section name: .gxfg
Source: vk_swiftshader.dll.7.drStatic PE information: section name: .retplne
Source: vk_swiftshader.dll.7.drStatic PE information: section name: .voltbl
Source: vk_swiftshader.dll.7.drStatic PE information: section name: _RDATA
Source: vulkan-1.dll.7.drStatic PE information: section name: .gxfg
Source: vulkan-1.dll.7.drStatic PE information: section name: .retplne
Source: vulkan-1.dll.7.drStatic PE information: section name: .voltbl
Source: vulkan-1.dll.7.drStatic PE information: section name: _RDATA
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B90F0B0 pushfq ; ret 8_2_00007FF64B90F0B1
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\node.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\System.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\Math.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\ffmpeg.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\libEGL.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\libGLESv2.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\NW_store.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\Uninstaller.exeJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\nw_elf.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\vk_swiftshader.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\notification_helper.exeJump to dropped file
Source: C:\Users\user\PCAppStore\PcAppStore.exeFile created: C:\Users\user\PCAppStore\download\SetupEngine.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\PcAppStore.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\vulkan-1.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\nw.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\AutoUpdater.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\Watchdog.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\nwjs\d3dcompiler_47.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\ui\static\js\2.801b9d83.chunk.js.LICENSE.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\PCAppStore\ReadMe.txtJump to behavior

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdaterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WatchdogJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PCAppStoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PC App Store.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PCAppStoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PCAppStoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdaterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdaterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WatchdogJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WatchdogJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Caption from Win32_DiskDrive
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Size from Win32_DiskDrive
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Caption from Win32_DiskDrive
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Size from Win32_DiskDrive
Source: C:\Users\user\PCAppStore\PcAppStore.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled =&apos;TRUE&apos;
Source: C:\Users\user\PCAppStore\Watchdog.exeThread delayed: delay time: 300000
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindow / User API: threadDelayed 825Jump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindow / User API: threadDelayed 932Jump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindow / User API: threadDelayed 1686Jump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindow / User API: foregroundWindowGot 1135Jump to behavior
Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 634
Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 637
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\node.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\System.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\Math.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\ffmpeg.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\libEGL.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\libGLESv2.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\Uninstaller.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\NW_store.exeJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\nw_elf.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\vk_swiftshader.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\notification_helper.exeJump to dropped file
Source: C:\Users\user\PCAppStore\PcAppStore.exeDropped PE file which has not been started: C:\Users\user\PCAppStore\download\SetupEngine.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa5834.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\vulkan-1.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\nw.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\AutoUpdater.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\d3dcompiler_47.dllJump to dropped file
Source: C:\Users\user\PCAppStore\Watchdog.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_9-16412
Source: C:\Users\user\PCAppStore\Watchdog.exe TID: 4808Thread sleep time: -120000s >= -30000s
Source: C:\Users\user\PCAppStore\Watchdog.exe TID: 8664Thread sleep time: -300000s >= -30000s
Source: C:\Users\user\PCAppStore\Watchdog.exe TID: 4808Thread sleep time: -60000s >= -30000s
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select ReleaseDate from Win32_BIOS
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select ReleaseDate from Win32_BIOS
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select UUID from Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Vendor from Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Version from Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select TotalPhysicalMemory from Win32_ComputerSystem
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select UUID from Win32_ComputerSystemProduct
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Vendor from Win32_ComputerSystemProduct
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Version from Win32_ComputerSystemProduct
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select TotalPhysicalMemory from Win32_ComputerSystem
Source: C:\Users\user\PCAppStore\PcAppStore.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystemProduct
Source: C:\Users\user\PCAppStore\PcAppStore.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\PCAppStore\Watchdog.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpCode function: 7_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_00405D74
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpCode function: 7_2_0040699E FindFirstFileW,FindClose,7_2_0040699E
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpCode function: 7_2_0040290B FindFirstFileW,7_2_0040290B
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAA75F8 FindClose,FindFirstFileExW,GetLastError,GetCurrentDirectoryW,GetLastError,8_2_00007FF64BAA75F8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAA76A8 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,8_2_00007FF64BAA76A8
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C616E0 FindClose,FindFirstFileExW,GetLastError,9_2_00007FF733C616E0
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C70330 FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_00007FF733C70330
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C61754 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,9_2_00007FF733C61754
Source: C:\Users\user\PCAppStore\Watchdog.exeThread delayed: delay time: 60000
Source: C:\Users\user\PCAppStore\Watchdog.exeThread delayed: delay time: 300000
Source: C:\Users\user\PCAppStore\Watchdog.exeThread delayed: delay time: 60000
Source: Watchdog.exe, 00000009.00000002.6488879245.00000174A0AC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdWndClass
Source: PcAppStore.exe, 00000008.00000003.6390340838.0000021A8D25B000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D308000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6462139913.0000021A8D308000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6442534687.0000021A8D25B000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6390517535.0000021A8D25B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ruarMicrosoft Hyper-V Virtualization Infrastructure Driver
Source: PcAppStore.exe, 00000008.00000003.5236199995.0000021A8A883000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6502464680.0000021A8A878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
Source: Setup.exe, 00000000.00000003.4779913764.00000000008C9000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4783809134.0000000002C50000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5207123401.000000000071C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000003.5084105733.000000000071C000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5211071511.0000000003A40000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF58000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6502464680.0000021A8A82C000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 00000009.00000002.6488879245.00000174A0B5F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6407012970.000000000D371000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6404067678.000000000D542000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6515256148.000000000D8B8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: svchost.exe, 00000003.00000002.6488762460.0000025092002000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D25B000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6462376747.0000021A8D254000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 67ruarMicrosoft Hyper-V Virtualization Infrastructure Driver
Source: nsy2C04.tmp, 00000007.00000002.5211071511.0000000003A40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWl
Source: Watchdog.exe, 00000009.00000002.6488879245.00000174A0AC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
Source: PcAppStore.exe, 0000001F.00000002.5199088323.000001BCBFF58000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000001F.00000003.5196134252.000001BCBFF58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PnPSignedDriverMicrosoft Hyper-V Virtualization Infrastructure DriverSYSTEMROOT\VIDROOT\VID\0000{4d36e97d-e325-11ce-bfc1-08002be10318}\Device\00000003Microsoftwvid.infMicrosoft20060621000000.******+***Microsoft Hyper-V Virtualization Infrastructure Driver10.0.19041.1052Microsoft WindowsLMEMh
Source: C:\Users\user\Desktop\Setup.exeAPI call chain: ExitProcess graph end nodegraph_0-3503
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpAPI call chain: ExitProcess graph end nodegraph_7-3481
Source: C:\Users\user\Desktop\Setup.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAC8CB8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FF64BAC8CB8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAA1254 GetLastError,IsDebuggerPresent,OutputDebugStringW,8_2_00007FF64BAA1254
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B90BFE0 RoGetActivationFactory,LoadLibraryW,GetProcAddress,RoGetActivationFactory,LoadLibraryW,GetProcAddress,8_2_00007FF64B90BFE0
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B926690 GetProcessHeap,HeapFree,8_2_00007FF64B926690
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAC8CB8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FF64BAC8CB8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAC3990 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00007FF64BAC3990
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C631C0 SetUnhandledExceptionFilter,9_2_00007FF733C631C0
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C62FDC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00007FF733C62FDC
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C67EA8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00007FF733C67EA8
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C6255C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00007FF733C6255C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtCreateMutant: Direct from: 0x77D634EC
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtMapViewOfSection: Direct from: 0x77D62C3C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtOpenSection: Direct from: 0x77D62D2C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtQueryValueKey: Direct from: 0x77D62B0C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtDeviceIoControlFile: Direct from: 0x77D62A0C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtQueryVolumeInformationFile: Direct from: 0x77D62E4C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtAllocateVirtualMemory: Direct from: 0x77D62B1C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtCreateFile: Direct from: 0x77D62F0C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtAddAtomEx: Direct from: 0x77D6304C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtOpenFile: Direct from: 0x77D62CEC
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtOpenKeyEx: Direct from: 0x77D63BBC
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtTerminateThread: Direct from: 0x77D62EEC
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtOpenKeyEx: Direct from: 0x77D62ABC
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtSetInformationThread: Direct from: 0x77D62DEC
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtQueryInformationProcess: Direct from: 0x77D62B46
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtReadVirtualMemory: Direct from: 0x77D62DAC
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtProtectVirtualMemory: Direct from: 0x77D62EBC
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtClose: Direct from: 0x77D62A8C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtQueryAttributesFile: Direct from: 0x77D62D8C
Source: C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exeNtSetInformationProcess: Direct from: 0x77D62B7C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64B935130 keybd_event,keybd_event,8_2_00007FF64B935130
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=00000000-0000-0000-0000-D05099DB2397&winver=19042&version=fa.1092c&nocache=20241105181325.34&_fcid=1730846226315208Jump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess created: unknown unknownJump to behavior
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpBinary or memory string: C++/WinRT version:2.0.220110.5productr_binErreCode=%dproductcreate_shortcutshortcut_erroroid=%luSHGetFolderPath_error_code=%X&oid=%luQueryInterface_error_code=%X&oid=%luCoCreateInstance_error_code=%X&oid=%lu.lnknfinityan.lnkindsnanproductshortcut_delete_erroreC=%XnfinityanindsnanShell_TrayWnd0p+00p+0unknowninfnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)unknownLTRRTLLTRinfnan(ind)nannan(snan)infnan(ind)nannan(snan)type must be string, but is type must be number, but is type must be number, but is \\\HKEY_CLASSES_ROOTHKEY_CURRENT_USERHKEY_LOCAL_MACHINEHKEY_USERSHKEY_CURRENT_CONFIGCurrentBuildBuildNumberSOFTWARE\Microsoft\Windows NT\CurrentVersionSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon%lu%02X\/Software\Microsoft\Windows\CurrentVersion\RunSoftware\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\RunSoftware\Microsoft\Windows\CurrentVersion\RunSoftware\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\RunSoftware\PCAppStoreAppParamdefaultauto_start_oncontextual_offersperiodical_offerspersonilized_notifications%us%5B%5D=\uparamsnametype must be string, but is paramsnameurloidentryAppfilePath0e+000e+00RoGetActivationFactorycombase.dllCoIncrementMTAUsagecombase.dll^(https?://(?:www.)?([^/]+))(/.*)?$.dllDllGetActivationFactoryURL format is not valid : %wsWinHTTP 1.0handle initialization failuretimeout init failurehandle connection failureGEThandle request creation failurehandle request or response failurefile creation failurequery data not availableurloidlastTimeoTypesessionIdtagretmessageRoGetActivationFactorycombase.dllCoIncrementMTAUsagecombase.dll.dllDllGetActivationFactoryiconnamepathoidanimationsoundmenu_storemenu_searchhttps://pcapp.storenamepathmicrosoftIdregpathkeydisplaycountblinkingnotificationIconrunParampathalt_linkmicrosoftIdregpathkeyidwinGetParamsaltActionaltActionParamsid
Source: PcAppStore.exe, 00000008.00000003.5237700010.0000021A8D00D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndZ
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpBinary or memory string: productui_creation_failedcreation_error=%wsui_termination_errordirectory_switching_error.\nwjs\NW_store.exe.\ui\.ENDING_EVT_HANDLERWindows Default Lock ScreenLocalPCAppStore\productsystem_eventmsg=shutdownshutdownproductsystem_eventmsg=logofflogoff{"app":{"menu_search":{"search_request":"", "page":"b"},"show_window": "menu_search"}}ClosingEventproducttaskbar_handler_erroreCode=%luShell_TrayWndStartTrayDummySearchControlTrayButton
Source: PcAppStore.exe, PcAppStore.exe, 00000008.00000003.5235439919.0000021A8D009000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5235705714.0000021A8D00A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6498254653.0000000001620000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: explorer.exe, 0000000A.00000002.6498254653.0000000001620000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000000.5084229581.0000000001621000.00000002.00000001.00040000.00000000.sdmp, tddPFIUbTNWNQ.exe, 0000000C.00000002.6496928334.0000000001390000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpBinary or memory string: list too longStartMenuExperienceHost.exeShellExperienceHost.exeexplorer.exeSearchApp.exeSearchUI.exeSearchHost.exe{"app":{"menu_search":{"search_request":"", "page":"a", "top":%d,"left":%d,"bottom":%d,"right":%d},"show_window": "menu_search"}}{"app": {"hide_window": "menu_search"}}Shell_TrayWndStartTrayDummySearchControlTrayButton
Source: explorer.exe, 0000000A.00000002.6487091486.0000000000F29000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5082921191.0000000000F29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: +Progman
Source: explorer.exe, 0000000A.00000002.6498254653.0000000001620000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000000.5084229581.0000000001621000.00000002.00000001.00040000.00000000.sdmp, tddPFIUbTNWNQ.exe, 0000000C.00000002.6496928334.0000000001390000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: explorer.exe, 0000000A.00000002.6498254653.0000000001620000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000000.5084229581.0000000001621000.00000002.00000001.00040000.00000000.sdmp, tddPFIUbTNWNQ.exe, 0000000C.00000002.6496928334.0000000001390000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 5Program ManagerjL
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpBinary or memory string: TTaskbarShell_TrayWnd{"app": {"init":{"direction":"%c","screen_size":{"with_topbar":%d,"t":%d,"l":%d,"b":%d,"r":%d}}}}
Source: nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpBinary or memory string: NWidgetShell_TrayWndTrayNotifyWnd+TrayButtonPNGArial++
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 9_2_00007FF733C767D0 cpuid 9_2_00007FF733C767D0
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: GetLocaleInfoEx,FormatMessageA,8_2_00007FF64BAA68B0
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: GetLocaleInfoEx,GetLocaleInfoEx,8_2_00007FF64B927BE0
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: GetLocaleInfoEx,FormatMessageA,9_2_00007FF733C61448
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 8_2_00007FF64BAA7B24 GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,8_2_00007FF64BAA7B24
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiSpywareProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiVirusProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from FirewallProduct
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiSpywareProduct
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiVirusProduct
Source: C:\Users\user\AppData\Local\Temp\nsy2C04.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from FirewallProduct

Stealing of Sensitive Information

barindex
Source: C:\Users\user\PCAppStore\PcAppStore.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts241
Windows Management Instrumentation
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
1
Deobfuscate/Decode Files or Information
1
OS Credential Dumping
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
1
DLL Search Order Hijacking
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
1
Input Capture
2
File and Directory Discovery
Remote Desktop Protocol1
Data from Local System
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Windows Service
1
DLL Search Order Hijacking
2
Obfuscated Files or Information
Security Account Manager156
System Information Discovery
SMB/Windows Admin Shares1
Input Capture
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron111
Registry Run Keys / Startup Folder
1
Access Token Manipulation
1
DLL Side-Loading
NTDS361
Security Software Discovery
Distributed Component Object Model1
Clipboard Data
Protocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
Windows Service
1
DLL Search Order Hijacking
LSA Secrets241
Virtualization/Sandbox Evasion
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts12
Process Injection
3
Masquerading
Cached Domain Credentials3
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items111
Registry Run Keys / Startup Folder
241
Virtualization/Sandbox Evasion
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1549726 Sample: Setup.exe Startdate: 06/11/2024 Architecture: WINDOWS Score: 54 87 Multi AV Scanner detection for dropped file 2->87 89 Machine Learning detection for sample 2->89 9 Setup.exe 2 42 2->9         started        14 svchost.exe 2->14         started        16 svchost.exe 2->16         started        process3 dnsIp4 71 79.127.206.235 GINCzechRepublicEUCZ Czech Republic 9->71 73 104.248.126.225 DIGITALOCEAN-ASNUS United States 9->73 57 C:\Users\user\AppData\Local\...\inetc.dll, PE32 9->57 dropped 59 C:\Users\user\AppData\...59SISFastLib.dll, PE32 9->59 dropped 61 C:\Users\user\AppData\Local\...\nsy2C04.tmp, PE32 9->61 dropped 63 3 other files (none is malicious) 9->63 dropped 99 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 9->99 18 nsy2C04.tmp 11 252 9->18         started        22 chrome.exe 2 9->22         started        file5 signatures6 process7 dnsIp8 49 C:\Users\user\PCAppStore\nwjs\vulkan-1.dll, PE32+ 18->49 dropped 51 C:\Users\user\...\vk_swiftshader.dll, PE32+ 18->51 dropped 53 C:\Users\user\PCAppStore\nwjs\nw_elf.dll, PE32+ 18->53 dropped 55 17 other files (11 malicious) 18->55 dropped 91 Multi AV Scanner detection for dropped file 18->91 93 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->93 95 Creates multiple autostart registry keys 18->95 25 PcAppStore.exe 3 4 18->25         started        30 Watchdog.exe 18->30         started        67 192.168.11.20 unknown unknown 22->67 69 239.255.255.250 unknown Reserved 22->69 32 chrome.exe 22->32         started        34 chrome.exe 22->34         started        36 chrome.exe 6 22->36         started        file9 signatures10 process11 dnsIp12 75 161.35.127.181 DIGITALOCEAN-ASNUS United States 25->75 77 147.182.211.77 BV-PUBLIC-ASNUS United States 25->77 65 C:\Users\user\PCAppStore\...\SetupEngine.exe, PE32 25->65 dropped 101 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 25->101 103 Tries to harvest and steal browser information (history, passwords, etc) 25->103 38 tddPFIUbTNWNQ.exe 25->38 injected 41 explorer.exe 25->41 injected 43 tddPFIUbTNWNQ.exe 25->43 injected 45 28 other processes 25->45 79 18.164.116.25 MIT-GATEWAYSUS United States 30->79 81 9.9.9.9 QUAD9-AS-1US United States 32->81 83 142.250.176.196 GOOGLEUS United States 32->83 85 27 other IPs or domains 32->85 file13 signatures14 process15 signatures16 97 Found direct / indirect Syscall (likely to bypass EDR) 38->97 47 PcAppStore.exe 41->47         started        process17

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Setup.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsa5834.tmp\Math.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsa5834.tmp\NSISFastLib.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsa5834.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsa5834.tmp\inetc.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsa5834.tmp\nsJSON.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsy2C04.tmp42%ReversingLabsWin32.PUA.Generic
C:\Users\user\AppData\Local\Temp\nsz155E.tmp\NSISFastLib.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsz155E.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsz155E.tmp\inetc.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsz155E.tmp\nsDialogs.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsz155E.tmp\nsJSON.dll0%ReversingLabs
C:\Users\user\PCAppStore\AutoUpdater.exe5%ReversingLabs
C:\Users\user\PCAppStore\PcAppStore.exe8%ReversingLabs
C:\Users\user\PCAppStore\Uninstaller.exe29%ReversingLabs
C:\Users\user\PCAppStore\Watchdog.exe5%ReversingLabs
C:\Users\user\PCAppStore\download\SetupEngine.exe18%ReversingLabs
C:\Users\user\PCAppStore\nwjs\NW_store.exe0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\d3dcompiler_47.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\ffmpeg.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\libEGL.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\libGLESv2.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\node.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\notification_helper.exe0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\nw.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\nw_elf.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\vk_swiftshader.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\vulkan-1.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://powerpoint.office.comEM0%Avira URL Cloudsafe
https://repcdn.veryfast.io/0%Avira URL Cloudsafe
https://d74queuslupub.cloudfront.net/0%Avira URL Cloudsafe
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF7i0%Avira URL Cloudsafe
https://outlook.comz0%Avira URL Cloudsafe
https://d74queuslupub.cloudfront.net/60%Avira URL Cloudsafe
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2C00%Avira URL Cloudsafe
https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=&evt_src=fa_mini_insta0%Avira URL Cloudsafe
https://repcdn.veryfast.io/download/2.349/Setup.exeLocationETagAuthentication-InfoAgeAccept-RangesLa0%Avira URL Cloudsafe
https://word.office.comZ0%Avira URL Cloudsafe
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF7i-dark0%Avira URL Cloudsafe
https://search.pcapp.store/r.html?q=%ws&br=%ws&en=%ws&guid=%ws&end_v=%wsatlTraceGeneralatlTraceCOMat0%Avira URL Cloudsafe
https://d74queuslupub.cloudfront.net/p.gif?guid=%ws&version=%ws&evt_src=watch_dog&evt_action=signal_0%Avira URL Cloudsafe
https://d74queuslupub.cloudfront.net/y0%Avira URL Cloudsafe
http://schemas.micro0%Avira URL Cloudsafe
https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=fa.1092cT0%Avira URL Cloudsafe
https://delivery.pcapp.store/rome0%Avira URL Cloudsafe
https://passwords.google.comT0%Avira URL Cloudsafe
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA12QGBm0%Avira URL Cloudsafe
https://pcapp.storenamepathmicrosoftIdregpathkeydisplaycountblinkingnotificationIconrunParampathalt_0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?unsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    https://veryfast.io/download.php?guid=00000000-0000-0000-0000-D05099DB2397&version=lastPcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF7iexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.msn.com/en-us/play/games/piece-of-cake/cg-9n5mln8fpwg8explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
        high
        https://support.google.com/chrome/answer/6098869nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6407012970.000000000D371000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6514495395.000000000D371000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D371000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
            high
            https://www.msn.com/en-us/news/technology/scientists-say-they-know-how-the-universe-will-end/ar-AA1sexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              https://ev.pcapp.store/WPcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://word.office.comZexplorer.exe, 0000000A.00000000.5102133790.000000000D319000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6407012970.000000000D319000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://outlook.comzexplorer.exe, 0000000A.00000000.5082921191.0000000000F43000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=&evt_src=fa_mini_instaSetup.exe, 00000000.00000002.4781894379.0000000000815000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://Realtor.comexplorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  https://powerpoint.office.comEMexplorer.exe, 0000000A.00000000.5111467182.000000000F683000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6408819549.000000000F683000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://pcapp.store/jPcAppStore.exe, 00000008.00000003.6442017436.0000021A8D326000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6441607656.0000021A8D326000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://chrome.google.com/webstore?hl=urCtrl$2nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://repcdn.veryfast.io/PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D19C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://photos.google.com/settings?referrer=CHROME_NTPnsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://ev.pcapp.store/sPcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_&evt_action=&nocache=%s%s%s%s%s%s%s%s&%s%s%Insy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpfalse
                            high
                            https://www.msn.com/en-us/news/world/after-188-years-the-world-s-longest-venomous-snake-is-officiallexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrlnsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.msn.com/en-us/health/wellness/75-things-under-15-on-amazon-prime-that-are-legitimately-aexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  https://wns.windows.com/explorer.exe, 0000000A.00000000.5111467182.000000000F683000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.6408819549.000000000F683000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5111467182.000000000F825000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/20240908.1/Weather/W33_Cleaexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      https://pcapp.store/tos.html?guid=Setup.exe, 00000000.00000002.4781894379.0000000000815000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5206602405.00000000006CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://aka.ms/odirm3explorer.exe, 0000000A.00000002.6509019068.0000000009938000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5092564302.0000000009938000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          https://pcapp.store/fa_version.php?guid=%ws&end_v=%ws&nocache=%dnsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://pcapp.store/9PcAppStore.exe, 00000008.00000003.6442017436.0000021A8D326000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6441607656.0000021A8D326000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://pcapp.store/pixel.gif?guid=PcAppStore.exefalse
                                                high
                                                https://chrome.google.com/webstorePcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.msn.com/en-us/news/world/israel-s-netanyahu-fires-defense-minister-gallant/ar-AA1tyHVGexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2C0explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp)u=explorer.exe, 0000000A.00000000.5092564302.000000000996A000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      high
                                                      https://d74queuslupub.cloudfront.net/Watchdog.exe, 00000009.00000002.6488879245.00000174A0B0B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://pcapp.store/notify_app_v2.php?guid=00000000-0000-0000-0000-D05099DB2397&lastid=802&lasttime=PcAppStore.exe, 00000008.00000003.6462702694.0000021A8D009000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://pcapp.store/notify_app_v2.php?guid=&lastid=&lasttime=&nocache=&end_v=%ws%ws%ws%d%ws%d%ws%ws%nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpfalse
                                                          high
                                                          https://www.google.com/chrome/privacy/eula_text.html&nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.google.com/chrome/privacy/eula_text.htmlT&rnsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://pcapp.store/PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://veryfast.io/NSPcAppStore.exe, 00000008.00000003.5366283526.0000021A8D1CD000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365634838.0000021A8D1C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://pcapp.store/pixel.gifinvalidnsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpfalse
                                                                    high
                                                                    https://www.msn.com/en-us/news/politics/6-things-to-watch-for-when-kamala-harris-debates-donald-trumexplorer.exe, 0000000A.00000000.5091419532.0000000009700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6508052285.0000000009706000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrlnsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?unsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://ev.pcapp.store/_&PcAppStore.exe, 00000008.00000002.6504036049.0000021A8CF87000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://chrome.google.com/webstore?hl=ukCtrl$1nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://ev.pcapp.store/9PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 0000000A.00000000.5092564302.000000000996A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6520505451.000000000F512000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5111467182.000000000F512000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://support.google.com/chrome/a/answer/9122284nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, nsy2C04.tmp, 00000007.00000002.5208276942.000000000306C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/MSIAWwA=/Condition/explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://pcapp.store/BPcAppStore.exe, 00000008.00000003.6442017436.0000021A8D326000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.6441607656.0000021A8D326000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://pcapp.store/cpg_fa.php?guid=Annsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpfalse
                                                                                          high
                                                                                          https://www.msn.com/en-us/news/world/western-officials-suspect-russia-was-behind-a-plot-to-put-incenexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://d74queuslupub.cloudfront.net/6Watchdog.exe, 00000009.00000002.6488879245.00000174A0B0B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://pcapp.store/privacy.html?guid=welhttps://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_minSetup.exe, 00000000.00000002.4781894379.0000000000815000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://repcdn.veryfast.io/download/2.349/Setup.exeLocationETagAuthentication-InfoAgeAccept-RangesLaPcAppStore.exe, 00000008.00000003.5366020883.0000021A8D19C000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                              • Avira URL Cloud: safe
                                                                                              unknown
                                                                                              https://assets.msn.com/weathermapdata/1/static/background/v2.0/jpg/explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF7i-darkexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                • Avira URL Cloud: safe
                                                                                                unknown
                                                                                                https://www.oracle.com/technetwork/java/javase/downloads09DgPcAppStore.exe, 00000008.00000002.6504780086.0000021A8D216000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://www.msn.com/en-us/music/news/minneapolis-musician-tyka-nelson-prince-s-sister-and-only-full-explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://veryfast.io/PcAppStore.exe, 00000008.00000003.5366283526.0000021A8D1CD000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000003.5365634838.0000021A8D1C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://www.msn.com/en-us/feedexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://schemas.microexplorer.exe, 0000000A.00000002.6510752187.0000000009EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000000.5085583496.0000000003370000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000002.6512355018.000000000C310000.00000002.00000001.00040000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        https://chrome.google.com/webstore?hl=zh-TWCtrl$1nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA12QGBmexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                          • Avira URL Cloud: safe
                                                                                                          unknown
                                                                                                          https://pcapp.store/inst_cpg.php?guid=&src=pcapp_full.nsy2C04.tmp, 00000007.00000002.5206602405.00000000006CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://ev.pcapp.store/szPcAppStore.exe, 00000008.00000002.6504780086.0000021A8D1DA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://pcapp.store/privacy.html?guid=Bynsy2C04.tmp, 00000007.00000002.5206602405.00000000006CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://chromeenterprise.google/policies/#BrowserSwitcherUrlListnsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://policies.google.com/nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://d74queuslupub.cloudfront.net/yWatchdog.exe, 00000009.00000002.6488879245.00000174A0B0B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    • Avira URL Cloud: safe
                                                                                                                    unknown
                                                                                                                    https://pcapp.store/fa_version.php?guid=%ws&res=link&nocache=%dnsy2C04.tmp, 00000007.00000002.5208276942.0000000002FDB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://assets.msn.com/weathermapdata/1/static/weather/Icons/MSIAWwA=/Condition/AAehwh2.svgexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://chrome.google.com/webstore/category/extensionsnsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://delivery.pcapp.store/romeSetup.exe, 00000000.00000003.4779654464.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.4783978741.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          • Avira URL Cloud: safe
                                                                                                                          unknown
                                                                                                                          https://pcapp.storenamepathmicrosoftIdregpathkeydisplaycountblinkingnotificationIconrunParampathalt_nsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpfalse
                                                                                                                          • Avira URL Cloud: safe
                                                                                                                          unknown
                                                                                                                          https://www.msn.com/en-us/news/politics/exit-polls-2024-fears-for-american-democracy-economic-disconexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://passwords.google.comTnsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                            • Avira URL Cloud: safe
                                                                                                                            unknown
                                                                                                                            https://windows.msn.com:443/shellv2?osLocale=en-us&chosenMarketReason=implicitNewexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://www.msn.com/en-us/news/politics/us-voters-cast-ballots-in-tight-race-as-turbulent-campaign-nexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://search.pcapp.store/r.html?q=%ws&br=%ws&en=%ws&guid=%ws&end_v=%wsatlTraceGeneralatlTraceCOMatnsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpfalse
                                                                                                                                • Avira URL Cloud: safe
                                                                                                                                unknown
                                                                                                                                https://www.msn.com/en-us/money/retirement/5-big-social-security-changes-for-2025-how-many-will-impaexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://veryfast.io/download.php?guid=00000000-0000-0000-0000-D05099PcAppStore.exe, 00000008.00000002.6504780086.0000021A8D136000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_installer&evt_action=localmacnsy2C04.tmp, 00000007.00000002.5206602405.00000000006CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://pcapp.store/dl_cta_open.php?guid=%ws&oid=%lu&entryApp=%wsnsy2C04.tmp, 00000007.00000002.5208276942.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, PcAppStore.exe, 00000008.00000000.5077075718.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000002.5201626989.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmp, PcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://pcapp.store/installing.php?guid=00000000-0000-0000-0000-D05099DB2397&winver=19042&version=faSetup.exe, 00000000.00000002.4783978741.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://www.msn.com/en-us/foodanddrink/recipes/i-asked-3-butchers-how-to-choose-the-best-steak-they-explorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelistnsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://pcapp.store/pixel.gif?guid=00000000-0000-0000-0000-D05099DB2397&version=fa.1092c&evt_src=fa_PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D18A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                https://stacker.com/storiesexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  https://d74queuslupub.cloudfront.net/p.gif?guid=%ws&version=%ws&evt_src=watch_dog&evt_action=signal_nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, Watchdog.exe, 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmp, Watchdog.exe, 00000009.00000002.6488879245.00000174A0A9C000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 00000009.00000000.5078205769.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpfalse
                                                                                                                                                  • Avira URL Cloud: safe
                                                                                                                                                  unknown
                                                                                                                                                  https://www.google.com/chrome/privacy/eula_text.htmlYar&dnsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://pcapp.store/e/PcAppStore.exe, 00000008.00000003.5366020883.0000021A8D181000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://pcapp.store/pixel.gifPcAppStore.exe, 0000001F.00000000.5189917193.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://assets.msn.com/weathermapdata/1/static/weather/Icons/MSIAWwA=/Condition/AAehwh2.pngexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://chrome.google.com/webstore?hl=viCtrl$1nsy2C04.tmp, 00000007.00000002.5208276942.00000000028F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://www.msn.com/en-us/play/games/fruit-chopper/cg-9n8wl40938mqexplorer.exe, 0000000A.00000000.5091419532.0000000009700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6508052285.0000000009706000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://api.msn.com/v1/news/Feed/Windows?activityId=E36B60CB23FA4E5A968F6A0804F3FDF2&timeOut=5000&ocexplorer.exe, 0000000A.00000003.6403430762.000000000D8F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.6518237173.000000000D8FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.5102133790.000000000D8B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                http://pcapp.store/notify_app_v2.php?guid=00000000-0000-0000-0000-D05099DB2397&lastid=802&lasttime=1PcAppStore.exe, 00000008.00000003.6442147558.0000021A8D217000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=fa.1092cTSetup.exe, 00000000.00000002.4781894379.000000000084A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  • Avira URL Cloud: safe
                                                                                                                                                                  unknown
                                                                                                                                                                  • No. of IPs < 25%
                                                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                                                  • 75% < No. of IPs
                                                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                  142.250.80.46
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  31.13.71.36
                                                                                                                                                                  unknownIreland
                                                                                                                                                                  32934FACEBOOKUSfalse
                                                                                                                                                                  216.239.34.181
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  79.127.206.207
                                                                                                                                                                  unknownCzech Republic
                                                                                                                                                                  9080GINCzechRepublicEUCZfalse
                                                                                                                                                                  142.251.40.131
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.251.40.132
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.251.40.195
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  147.182.211.77
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  27555BV-PUBLIC-ASNUSfalse
                                                                                                                                                                  157.240.241.1
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  32934FACEBOOKUSfalse
                                                                                                                                                                  161.35.127.181
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  14061DIGITALOCEAN-ASNUSfalse
                                                                                                                                                                  104.248.126.225
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  14061DIGITALOCEAN-ASNUSfalse
                                                                                                                                                                  142.251.35.174
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.250.80.106
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  9.9.9.9
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  19281QUAD9-AS-1USfalse
                                                                                                                                                                  142.250.80.104
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  1.1.1.1
                                                                                                                                                                  unknownAustralia
                                                                                                                                                                  13335CLOUDFLARENETUSfalse
                                                                                                                                                                  142.251.179.84
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.251.35.170
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.250.176.196
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.251.163.154
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  18.164.116.25
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  3MIT-GATEWAYSUSfalse
                                                                                                                                                                  167.99.235.203
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  14061DIGITALOCEAN-ASNUSfalse
                                                                                                                                                                  79.127.206.234
                                                                                                                                                                  unknownCzech Republic
                                                                                                                                                                  9080GINCzechRepublicEUCZfalse
                                                                                                                                                                  79.127.206.235
                                                                                                                                                                  unknownCzech Republic
                                                                                                                                                                  9080GINCzechRepublicEUCZfalse
                                                                                                                                                                  142.250.64.67
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.251.40.100
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.251.40.200
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  64.227.17.224
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  14061DIGITALOCEAN-ASNUSfalse
                                                                                                                                                                  239.255.255.250
                                                                                                                                                                  unknownReserved
                                                                                                                                                                  unknownunknownfalse
                                                                                                                                                                  31.13.71.7
                                                                                                                                                                  unknownIreland
                                                                                                                                                                  32934FACEBOOKUSfalse
                                                                                                                                                                  79.127.206.208
                                                                                                                                                                  unknownCzech Republic
                                                                                                                                                                  9080GINCzechRepublicEUCZfalse
                                                                                                                                                                  142.251.40.162
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.250.65.200
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.250.72.98
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  142.251.35.162
                                                                                                                                                                  unknownUnited States
                                                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                                                  IP
                                                                                                                                                                  192.168.11.20
                                                                                                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                  Analysis ID:1549726
                                                                                                                                                                  Start date and time:2024-11-06 00:11:16 +01:00
                                                                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                                                                  Overall analysis duration:0h 13m 6s
                                                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                                                  Report type:full
                                                                                                                                                                  Cookbook file name:default.jbs
                                                                                                                                                                  Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                                                                                                                                                  Run name:Run with higher sleep bypass
                                                                                                                                                                  Number of analysed new started processes analysed:14
                                                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                                                  Number of injected processes analysed:31
                                                                                                                                                                  Technologies:
                                                                                                                                                                  • HCA enabled
                                                                                                                                                                  • EGA enabled
                                                                                                                                                                  • AMSI enabled
                                                                                                                                                                  Analysis Mode:default
                                                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                                                  Sample name:Setup.exe
                                                                                                                                                                  Detection:MAL
                                                                                                                                                                  Classification:mal54.spyw.evad.winEXE@40/270@0/36
                                                                                                                                                                  EGA Information:
                                                                                                                                                                  • Successful, ratio: 100%
                                                                                                                                                                  HCA Information:
                                                                                                                                                                  • Successful, ratio: 67%
                                                                                                                                                                  • Number of executed functions: 170
                                                                                                                                                                  • Number of non-executed functions: 125
                                                                                                                                                                  Cookbook Comments:
                                                                                                                                                                  • Found application associated with file extension: .exe
                                                                                                                                                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                                                                                                  • Exclude process from analysis (whitelisted): Conhost.exe, dllhost.exe
                                                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                                                                                                                  • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                                                                                  • Report size getting too big, too many NtOpenKey calls found.
                                                                                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                  • Skipping network analysis since amount of network traffic is too extensive
                                                                                                                                                                  • VT rate limit hit for: Setup.exe
                                                                                                                                                                  TimeTypeDescription
                                                                                                                                                                  00:14:10AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run PCAppStore "C:\Users\user\PCAppStore\PCAppStore.exe" /init default
                                                                                                                                                                  00:14:18AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdater "C:\Users\user\PCAppStore\AutoUpdater.exe" /i
                                                                                                                                                                  00:14:26AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Watchdog "C:\Users\user\PCAppStore\Watchdog.exe" /guid=00000000-0000-0000-0000-D05099DB2397 /rid=20241105181407.1816081953 /ver=fa.1092c
                                                                                                                                                                  00:14:34AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run PCAppStore "C:\Users\user\PCAppStore\PCAppStore.exe" /init default
                                                                                                                                                                  00:14:42AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdater "C:\Users\user\PCAppStore\AutoUpdater.exe" /i
                                                                                                                                                                  00:14:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Watchdog "C:\Users\user\PCAppStore\Watchdog.exe" /guid=00000000-0000-0000-0000-D05099DB2397 /rid=20241105181407.1816081953 /ver=fa.1092c
                                                                                                                                                                  00:15:01Task SchedulerRun new task: fast_task path: C:\Program Files (x86)\Fast!\fast!.exe
                                                                                                                                                                  18:15:44API Interceptor11618x Sleep call for process: PcAppStore.exe modified
                                                                                                                                                                  InputOutput
                                                                                                                                                                  URL: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092c Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "contains_trigger_text": true,
                                                                                                                                                                    "trigger_text": "We're on it, hold on",
                                                                                                                                                                    "prominent_button_name": "unknown",
                                                                                                                                                                    "text_input_field_labels": "unknown",
                                                                                                                                                                    "pdf_icon_visible": false,
                                                                                                                                                                    "has_visible_captcha": false,
                                                                                                                                                                    "has_urgent_text": false,
                                                                                                                                                                    "has_visible_qrcode": false
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092c Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "contains_trigger_text": true,
                                                                                                                                                                    "trigger_text": "Summoning the app genie",
                                                                                                                                                                    "prominent_button_name": "unknown",
                                                                                                                                                                    "text_input_field_labels": "unknown",
                                                                                                                                                                    "pdf_icon_visible": false,
                                                                                                                                                                    "has_visible_captcha": false,
                                                                                                                                                                    "has_urgent_text": false,
                                                                                                                                                                    "has_visible_qrcode": false
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092c Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "brands": [
                                                                                                                                                                      "PC APP STORE"
                                                                                                                                                                    ]
                                                                                                                                                                  }
                                                                                                                                                                  URL: Model: claude-3-5-sonnet-latest
                                                                                                                                                                  {
                                                                                                                                                                      "typosquatting": false,
                                                                                                                                                                      "unusual_query_string": false,
                                                                                                                                                                      "suspicious_tld": true,
                                                                                                                                                                      "ip_in_url": false,
                                                                                                                                                                      "long_subdomain": false,
                                                                                                                                                                      "malicious_keywords": false,
                                                                                                                                                                      "encoded_characters": false,
                                                                                                                                                                      "redirection": false,
                                                                                                                                                                      "contains_email_address": false,
                                                                                                                                                                      "known_domain": false,
                                                                                                                                                                      "brand_spoofing_attempt": false,
                                                                                                                                                                      "third_party_hosting": false
                                                                                                                                                                  }
                                                                                                                                                                  URL: URL: https://pcapp.store
                                                                                                                                                                  URL: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092c Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "contains_trigger_text": false,
                                                                                                                                                                    "trigger_text": "unknown",
                                                                                                                                                                    "prominent_button_name": "unknown",
                                                                                                                                                                    "text_input_field_labels": "unknown",
                                                                                                                                                                    "pdf_icon_visible": false,
                                                                                                                                                                    "has_visible_captcha": false,
                                                                                                                                                                    "has_urgent_text": false,
                                                                                                                                                                    "has_visible_qrcode": false
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092c Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "contains_trigger_text": false,
                                                                                                                                                                    "trigger_text": "unknown",
                                                                                                                                                                    "prominent_button_name": "unknown",
                                                                                                                                                                    "text_input_field_labels": "unknown",
                                                                                                                                                                    "pdf_icon_visible": false,
                                                                                                                                                                    "has_visible_captcha": false,
                                                                                                                                                                    "has_urgent_text": false,
                                                                                                                                                                    "has_visible_qrcode": false
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092c Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "brands": [
                                                                                                                                                                      "PC APP STORE"
                                                                                                                                                                    ]
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092c Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "brands": [
                                                                                                                                                                      "PC APP STORE"
                                                                                                                                                                    ]
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "contains_trigger_text": true,
                                                                                                                                                                    "trigger_text": "Installing Fast!, what's next?",
                                                                                                                                                                    "prominent_button_name": "unknown",
                                                                                                                                                                    "text_input_field_labels": "unknown",
                                                                                                                                                                    "pdf_icon_visible": false,
                                                                                                                                                                    "has_visible_captcha": false,
                                                                                                                                                                    "has_urgent_text": false,
                                                                                                                                                                    "has_visible_qrcode": false
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://pcapp.store/?p=lpd_installing_r2&guid=00000000-0000-0000-0000-D05099DB2397&_fcid=1730846226315208&_winver=19042&version=fa.1092c Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "brands": [
                                                                                                                                                                      "PC APP STORE"
                                                                                                                                                                    ]
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "contains_trigger_text": true,
                                                                                                                                                                    "trigger_text": "Test drive Fast! - You will notice immediately how everything works faster and smoother, it's like having a new upgraded PC.",
                                                                                                                                                                    "prominent_button_name": "unknown",
                                                                                                                                                                    "text_input_field_labels": "unknown",
                                                                                                                                                                    "pdf_icon_visible": false,
                                                                                                                                                                    "has_visible_captcha": false,
                                                                                                                                                                    "has_urgent_text": true,
                                                                                                                                                                    "has_visible_qrcode": false
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "brands": [
                                                                                                                                                                      "Fast!"
                                                                                                                                                                    ]
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://veryfast.io/installed.php?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "contains_trigger_text": true,
                                                                                                                                                                    "trigger_text": "Fast! has been installed and will start shortly.",
                                                                                                                                                                    "prominent_button_name": "unknown",
                                                                                                                                                                    "text_input_field_labels": "unknown",
                                                                                                                                                                    "pdf_icon_visible": false,
                                                                                                                                                                    "has_visible_captcha": false,
                                                                                                                                                                    "has_urgent_text": true,
                                                                                                                                                                    "has_visible_qrcode": false
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "contains_trigger_text": false,
                                                                                                                                                                    "trigger_text": "unknown",
                                                                                                                                                                    "prominent_button_name": "unknown",
                                                                                                                                                                    "text_input_field_labels": "unknown",
                                                                                                                                                                    "pdf_icon_visible": false,
                                                                                                                                                                    "has_visible_captcha": false,
                                                                                                                                                                    "has_urgent_text": false,
                                                                                                                                                                    "has_visible_qrcode": false
                                                                                                                                                                  }
                                                                                                                                                                  ```
                                                                                                                                                                  
                                                                                                                                                                  The provided image appears to be a simple informational page about a software product called "Fast!". It does not contain any visible trigger text, input fields, PDF icons, CAPTCHAs, urgent language, or QR codes. The page seems to be focused on describing the features and benefits of the "Fast!" product, rather than prompting any specific user actions or accessing sensitive information.
                                                                                                                                                                  URL: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "brands": [
                                                                                                                                                                      "Fast!"
                                                                                                                                                                    ]
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "brands": [
                                                                                                                                                                      "Fast!"
                                                                                                                                                                    ]
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://veryfast.io/installed.php?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "brands": [
                                                                                                                                                                      "Fast!"
                                                                                                                                                                    ]
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "contains_trigger_text": true,
                                                                                                                                                                    "trigger_text": "Installing Fast!, what's next?",
                                                                                                                                                                    "prominent_button_name": "unknown",
                                                                                                                                                                    "text_input_field_labels": "unknown",
                                                                                                                                                                    "pdf_icon_visible": false,
                                                                                                                                                                    "has_visible_captcha": false,
                                                                                                                                                                    "has_urgent_text": true,
                                                                                                                                                                    "has_visible_qrcode": false
                                                                                                                                                                  }
                                                                                                                                                                  URL: https://veryfast.io/installing2.html?guid=00000000-0000-0000-0000-D05099DB2397&_fcid= Model: claude-3-haiku-20240307
                                                                                                                                                                  ```json
                                                                                                                                                                  {
                                                                                                                                                                    "brands": [
                                                                                                                                                                      "Fast!"
                                                                                                                                                                    ]
                                                                                                                                                                  }
                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                  9.9.9.9file.exeGet hashmaliciousAmadey, LummaC Stealer, XWormBrowse
                                                                                                                                                                    http://assets.website-files.com/65e885e17261602dcdc10dce/663166d899226eaa1af23d4b_kilexi.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                                      All-in-one Calculation Tool.xlsmGet hashmaliciousUnknownBrowse
                                                                                                                                                                        https://agent.fleetdeck.io/RJhGzP5jyL7Wdj5mXz3b8B?winGet hashmaliciousUnknownBrowse
                                                                                                                                                                          https://agentinstall.fleetdeck.io/fleetdeck-agent-WP1buGiXuuz5gPKfbD5LmX.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                            AFFAIRE JUDICIAIRE MAILLARD.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                                              SecuriteInfo.com.Win32.Trojan.CobaltStrike.4EYNH5.5772.17622.dllGet hashmaliciousCobaltStrikeBrowse
                                                                                                                                                                                https://storage.googleapis.com/edusa/algonquincollege.html#4cCRYb398kcWP32jndkfhfjyc4MIWDSMDNXLSZCFF1708863VSUP299741N9Get hashmaliciousPhisherBrowse
                                                                                                                                                                                  https://download.onelaunch.com/latest/Onelaunch%20Software.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                    147.182.211.77Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                      Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                          Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                            Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                              161.35.127.181SetupEngine.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                https://veryfast.ioGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                  https://veryfast.ioGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                    https://macdownload.informer.com/osx-fiery-master-installer/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                      9c23f857-b0b9-47d6-b664-47a3132066f4.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                        9c23f857-b0b9-47d6-b664-47a3132066f4.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                          Setup (1).exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            Setup (1).exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                              Setup (1).exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                104.248.126.225https://pcapp.store/pixel.gifGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    Setup (1).exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                      MDE_File_Sample_c30dd28cb119f2aa20ddabe8968b8cadbe80bcb2.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                        nso7806.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                          Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                            http://pcapp.storeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                              http://pcapp.storeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                PcAppStore.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  No context
                                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                  GINCzechRepublicEUCZla.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 79.127.205.103
                                                                                                                                                                                                                                  https://beforeitsnews.com/health/2024/10/the-happier-meditation-app-is-offering-free-1-year-access-99-value-3059722.htmlGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 79.127.227.46
                                                                                                                                                                                                                                  http://fortcollinsfineart.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 79.127.216.66
                                                                                                                                                                                                                                  81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                                                                                                  • 79.127.222.216
                                                                                                                                                                                                                                  http://en-alldappfix.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                  • 79.127.216.47
                                                                                                                                                                                                                                  https://solanadefimainnet.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                  • 79.127.227.46
                                                                                                                                                                                                                                  http://nodechain-launchpadlpx.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                  • 79.127.227.46
                                                                                                                                                                                                                                  https://simplescalingdefender.pages.dev/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 79.127.227.46
                                                                                                                                                                                                                                  http://rewardsforyoutoclaim.pages.dev/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 79.127.216.47
                                                                                                                                                                                                                                  DIGITALOCEAN-ASNUS2va9zrsXLd.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                                  • 206.189.218.238
                                                                                                                                                                                                                                  Eveshaw.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 159.65.213.219
                                                                                                                                                                                                                                  Mandatory 2FA Authenticator - Immediate Attention Required! October 18 2024 115452(UTC).msgGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 67.205.176.222
                                                                                                                                                                                                                                  https://www.google.com/url?q=https%3A%2F%2Fhm.ru%2FavuRpS&sa=D&sntz=1&usg=AOvVaw3TJv_p-78LeKmDlxZZNN5yGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 198.199.109.95
                                                                                                                                                                                                                                  https://zip-store.oss-ap-southeast-1.aliyuncs.com/updated%20file/paracms.txtGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 159.65.211.77
                                                                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 167.99.235.203
                                                                                                                                                                                                                                  Payload 94.75 (3).225.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 167.172.128.225
                                                                                                                                                                                                                                  Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 138.68.9.184
                                                                                                                                                                                                                                  Ponta Saheb. PO 4400049817.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                                                                                                  • 167.172.133.32
                                                                                                                                                                                                                                  DIGITALOCEAN-ASNUS2va9zrsXLd.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                                  • 206.189.218.238
                                                                                                                                                                                                                                  Eveshaw.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 159.65.213.219
                                                                                                                                                                                                                                  Mandatory 2FA Authenticator - Immediate Attention Required! October 18 2024 115452(UTC).msgGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 67.205.176.222
                                                                                                                                                                                                                                  https://www.google.com/url?q=https%3A%2F%2Fhm.ru%2FavuRpS&sa=D&sntz=1&usg=AOvVaw3TJv_p-78LeKmDlxZZNN5yGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 198.199.109.95
                                                                                                                                                                                                                                  https://zip-store.oss-ap-southeast-1.aliyuncs.com/updated%20file/paracms.txtGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 159.65.211.77
                                                                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 167.99.235.203
                                                                                                                                                                                                                                  Payload 94.75 (3).225.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 167.172.128.225
                                                                                                                                                                                                                                  Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 138.68.9.184
                                                                                                                                                                                                                                  Ponta Saheb. PO 4400049817.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                                                                                                  • 167.172.133.32
                                                                                                                                                                                                                                  BV-PUBLIC-ASNUShttps://averellharriman.sharefile.com/public/share/web-s3b96c17360cd43e7bdcaf25a23709fd0Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 147.182.200.48
                                                                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 147.182.211.77
                                                                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 147.182.211.77
                                                                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 147.182.211.77
                                                                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 147.182.211.77
                                                                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 147.182.211.77
                                                                                                                                                                                                                                  la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 147.182.236.130
                                                                                                                                                                                                                                  armv4l.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                  • 147.183.0.9
                                                                                                                                                                                                                                  1.exeGet hashmaliciousMetasploitBrowse
                                                                                                                                                                                                                                  • 147.182.192.25
                                                                                                                                                                                                                                  No context
                                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                  C:\Users\user\AppData\Local\Temp\nsa5834.tmp\Math.dllSetup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                    Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                      Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                        https://pcapp.store/pixel.gifGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                          Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                            Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                              Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                tKr6T60C1r.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    Process:C:\Windows\explorer.exe
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):101576
                                                                                                                                                                                                                                                    Entropy (8bit):4.025656042521211
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:768:1lpOk7GzmvfZjk0O2ihviYiciohVM3NxL2qQq++X6fM1MYR1v4GUGSmoypg3wSlk:4kPo2ihviYiciohVMwinGRnKn+atWI
                                                                                                                                                                                                                                                    MD5:B9BEAEB61952155A651049495D3C43D8
                                                                                                                                                                                                                                                    SHA1:4D3B77719911B9AF643D47EEA181E82BABF7B1C9
                                                                                                                                                                                                                                                    SHA-256:3F8D5A69D2564D778CC635CD403213F5E78420F96912DCD8D778937CB0AE4F50
                                                                                                                                                                                                                                                    SHA-512:CEF3C89EBC258056FB37745643CA0CB5EAEBFAE35AEF436B435E2EF5637BF5AB03F5DD635C2E847B9B15FBC9E053304EC513A6366CBEF5DC88F0023A46FA85B5
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:....h... .............P..............Q...0...Z...8..................O.......e.n.-.U.S.;.e.n.-.G.B...............X..............P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................A.r.t.h.u.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u......................(..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>...........................................
                                                                                                                                                                                                                                                    Process:C:\Windows\explorer.exe
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):104664
                                                                                                                                                                                                                                                    Entropy (8bit):4.02824413140037
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:1536:40kZvSEviYiciodAMuOAYqiEGbn0k+WvHxn:40kZvSEviYiciodDuOhqiek+WvRn
                                                                                                                                                                                                                                                    MD5:186330B93EC4676580C95B8B77C87865
                                                                                                                                                                                                                                                    SHA1:99A5DB1C6CA209952976FB3946720745EA174E58
                                                                                                                                                                                                                                                    SHA-256:07545587EC2867545B4A78B6051A7990714B7AD8B8B77655B4450D0E5A122DE6
                                                                                                                                                                                                                                                    SHA-512:5F2F6D68C378950B4CD744C495BDBAE9269AF466225E10FC870933EAF8B72F57700AFA3CCEB0793861E9E7B75DB51B68DAB3D6FF5D72AF20866B98C34FD1EFC3
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:....h... .............P..............S.......]...8..................Q.......e.n.-.U.S.;.e.n.-.G.B...............X..............P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................A.r.t.h.u.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u......................(..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>...........................................
                                                                                                                                                                                                                                                    Process:C:\Windows\explorer.exe
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):103832
                                                                                                                                                                                                                                                    Entropy (8bit):4.03300489557214
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:768:zMlZxdIkHG0mmxA/jk0M0nviYicioIA3RNfLUhiq3QjNMp72jR1vslFPRmOypJ3G:z0IkZn0nviYicioIA3hiKGgnVy+Nw7
                                                                                                                                                                                                                                                    MD5:EF6E2874789EC4DDF2D6F0EDD0471D6F
                                                                                                                                                                                                                                                    SHA1:5F06513BB62F1F0DE95CC258C24BDA551C37441D
                                                                                                                                                                                                                                                    SHA-256:C51C9B399791C87A30E18306CDFE4558D7BEB396D6963877F708A0A53B8BE243
                                                                                                                                                                                                                                                    SHA-512:04940E6D0A5A5C444C0F4DA5E5674BB258FA6D530E985775F43296EE7928F22E9CA508B91FEDF41D3B2791CC04C1BC421C13FD8668B785AF552EEEA39F4F4405
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:....h... ...............P...............S......]...................P...Q.......e.n.-.U.S.;.e.n.-.G.B..............................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................A.r.t.h.u.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u......................(..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>...........................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                                                                    File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):42
                                                                                                                                                                                                                                                    Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                                                                    MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                                                                    SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                                                                    SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                                                                    SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):69120
                                                                                                                                                                                                                                                    Entropy (8bit):6.024967061017882
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:1536:GUZ9QC7V7IGMp2ZmtSX5p9IeJXlSM2tS:T97WSth5lwt
                                                                                                                                                                                                                                                    MD5:85428CF1F140E5023F4C9D179B704702
                                                                                                                                                                                                                                                    SHA1:1B51213DDBAEDFFFB7E7F098F172F1D4E5C9EFBA
                                                                                                                                                                                                                                                    SHA-256:8D9A23DD2004B68C0D2E64E6C6AD330D0C648BFFE2B9F619A1E9760EF978207A
                                                                                                                                                                                                                                                    SHA-512:DFE7F9F3030485CAF30EC631424120030C3985DF778993342A371BF1724FA84AA885B4E466C6F6B356D99CC24E564B9C702C7BCDD33052172E0794C2FDECCE59
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Joe Sandbox View:
                                                                                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: , Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: tKr6T60C1r.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........w.................F.........................5.....5....:6....Rich...........PE..L.....Oa...........!................KG....................................................@.............................B.......(....................................................................................................................text...b........................... ..`.rdata..R...........................@..@.data............2..................@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):140288
                                                                                                                                                                                                                                                    Entropy (8bit):6.334087823000165
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3072:H5dnvmOEATceozVDkRasOCdUFZrR7beB2SK0XCC+W/ST+BeXZQUC5:ZdnvmsTceZUtCdUFZr9b4KznC5
                                                                                                                                                                                                                                                    MD5:9C7A4D75F08D40AD6F5250DF6739C1B8
                                                                                                                                                                                                                                                    SHA1:793749511C61B00A793D0AEA487E366256DD1B95
                                                                                                                                                                                                                                                    SHA-256:6EB17C527C9E7F7FEA1FDB2EA152E957B50A56796E53CE1E5946B165B82DEAEF
                                                                                                                                                                                                                                                    SHA-512:E85235307B85FFD3AAB76FF6290BEE0B3B9FD74C61A812B5355FE7B854D4C6B77BD521E52638D28E249A43D9EC7AA6F2670AF2B1C671091492C7FE19D6F9A4E6
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$......../.iTN.:TN.:TN.:.6.;^N.:.6.;.N.:.6.;@N.:.6.;UN.:...;AN.:...;DN.:...;{N.:.6.;_N.:TN.:'N.:B..;QN.:B..;UN.:B.%:UN.:TNM:UN.:B..;UN.:RichTN.:........................PE..L...z..f...........!...(.x...................................................`..............................................x...x....0..X....................@......0...............................p...@............................................text...0v.......x.................. ..`.rdata..\~...........|..............@..@.data...............................@....rsrc...X....0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):12288
                                                                                                                                                                                                                                                    Entropy (8bit):5.814115788739565
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                                                                                                                                                                                                                                    MD5:CFF85C549D536F651D4FB8387F1976F2
                                                                                                                                                                                                                                                    SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                                                                                                                                                                                                                                    SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                                                                                                                                                                                                                                    SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:GIF image data, version 89a, 16 x 16
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):997
                                                                                                                                                                                                                                                    Entropy (8bit):4.188896534234179
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12:2E5KZbHOjOruFw6MLxENScRVar7FC53tK1Oqd3Aa0n:tAlHOjOX60ENvRVZKbEn
                                                                                                                                                                                                                                                    MD5:1636218C14C357455B5C872982E2A047
                                                                                                                                                                                                                                                    SHA1:21FBD1308AF7AD25352667583A8DC340B0847DBC
                                                                                                                                                                                                                                                    SHA-256:9B8B6285BF65F086E08701EEE04E57F2586E973A49C5A38660C9C6502A807045
                                                                                                                                                                                                                                                    SHA-512:837FA6BCBE69A3728F5CB4C25C35C1D13E84B11232FC5279A91F21341892AD0E36003D86962C8AB1A056D3BEEB2652C754D51D6EC7EEE0E0EBFE19CD93FB5CB0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:GIF89a............P..........4q...5j...O..F.].......................o..._.....5y.t........\....K>}...g..t....X...B..ET....t~....go..Jx...........|..U!f.|....>u.M.........w>..+r...|...A{.....t...E...b.8}....d....A.....R..y..l...w....G5u...{....t.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!..NETSCAPE2.0.....!.......,...............H..A....`pp....~.xR......d.......,...D...)2 .1.....N` R......(@......,8RDA../..XB....P.F .....#...b`F...#8p......<\.`.........A....n|.CH...........+... .E.....d`.@......;
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):39424
                                                                                                                                                                                                                                                    Entropy (8bit):4.684597989866362
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:384:njt65uI9oYzcCaHjl9Cb4I1f0AGhrHXoREnRxtIpH/u0abJ2v2DW9O9tk8ZwkpwD:noHtNQoRSIwTJB6Q/kPyBp6
                                                                                                                                                                                                                                                    MD5:A35CDC9CF1D17216C0AB8C5282488EAD
                                                                                                                                                                                                                                                    SHA1:ED8E8091A924343AD8791D85E2733C14839F0D36
                                                                                                                                                                                                                                                    SHA-256:A793929232AFB78B1C5B2F45D82094098BCF01523159FAD1032147D8D5F9C4DF
                                                                                                                                                                                                                                                    SHA-512:0F15B00D0BF2AABD194302E599D69962147B4B3EF99E5A5F8D5797A7A56FD75DD9DB0A667CFBA9C758E6F0DAB9CED126A9B43948935FE37FC31D96278A842BDF
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&.[.H.[.H.[.H.O.I.R.H.[.I...H...M.Y.H...L.Z.H...H.Z.H.....Z.H...J.Z.H.Rich[.H.................PE..L...n..c...........!.....T.........._........p............................... ............@..........................x......D...d...............................t....w..8...............................................D............................text....S.......T.................. ..`.rdata.......p.......X..............@..@.data....i...........d..............@....idata..A............v..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):24064
                                                                                                                                                                                                                                                    Entropy (8bit):5.819708895488079
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:384:n7U5CiIZ1ZC2RvhrTfldNuwQ5pk+BISivMyyOgqCoRUj+OvHxOuofnykhVQJrTU:YoZ1ZnhrTfldqk7Yyy94RxOcVQJrT
                                                                                                                                                                                                                                                    MD5:F4D89D9A2A3E2F164AEA3E93864905C9
                                                                                                                                                                                                                                                    SHA1:4D4E05EE5E4E77A0631A3DD064C171BA2E227D4A
                                                                                                                                                                                                                                                    SHA-256:64B3EFDF3DE54E338D4DB96B549A7BDB7237BB88A82A0A63AEF570327A78A6FB
                                                                                                                                                                                                                                                    SHA-512:DBDA3FE7CA22C23D2D0F2A5D9D415A96112E2965081582C7A42C139A55C5D861A27F0BD919504DE4F82C59CF7D1B97F95ED5A55E87D574635AFDB7EB2D8CADF2
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.'..fI_.fI_.fI_3.H^.fI_.fH_?fI_.8M^.fI_.8I^.fI_.8._.fI_.8K^.fI_Rich.fI_........PE..L...`..Z...........!.....>..........E........P............................................@..........................X......@Z..P....p..........................H....X...............................................P...............................text...W<.......>.................. ..`.rdata.......P.......B..............@..@.data...@....`.......R..............@....rsrc........p.......T..............@..@.reloc..H............X..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):318525781
                                                                                                                                                                                                                                                    Entropy (8bit):6.931313706371873
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3145728:EEnqgvUBRlhK9QJiDS610scieJq1SXCSnsmdAGonTn:EEIKe0Djq7hCSkH
                                                                                                                                                                                                                                                    MD5:1E82AC21A0AB4FB084013AC7F54B3647
                                                                                                                                                                                                                                                    SHA1:152308A3F71C6CB7EADC4A6ECE3991E679CFC92F
                                                                                                                                                                                                                                                    SHA-256:6A776340A1B9EC3E8094D3B46C247A3144F882D57AD976E6467407B8E09C3204
                                                                                                                                                                                                                                                    SHA-512:A2F2C3C83F2FA83EEDBC3D70BF60E7DD16794B7DACD41FF2DA225034349ED2FDA070BA12F4E5E880A5B5FD81FA58B9C115B9A5812728575750704647654FDE89
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.7......,.......,.......D...=...........^6......\7..............................................................m...........................................................................................................................................................................3................2..................................................................................................................................j.......................k...................................................................................................................s..........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):93386616
                                                                                                                                                                                                                                                    Entropy (8bit):7.99999306217129
                                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                                    SSDEEP:1572864:52KX1mfH5AoIZnp9/pkhKzHjrSADzxet6X3mRsDqpszbyxjpB3ayh1sN1KGoMy1u:5jExAJh/pksTnFet6mu2G0jptggJ+flP
                                                                                                                                                                                                                                                    MD5:84EE733F8014D22DAD2DFEF725489980
                                                                                                                                                                                                                                                    SHA1:950A437488464103B9BF34610962C22192585BFC
                                                                                                                                                                                                                                                    SHA-256:F42D2BF4A50AB0CDB4A1C43964F0429C4663E27C76D8C61AFA174A531A7819A1
                                                                                                                                                                                                                                                    SHA-512:132C9BE1217804B73F8A99EA44D702E9DA0782CB6BBCC80DB2C2C72BDA1A93D06B2ADEF1B464F9163311F7482B2400553BA082C0F7F3CCF3B42C8C9B881306EB
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 42%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@.......................... ............@.............................................HO.......... ..X)...........................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata... ...............................rsrc...HO.......P..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):140288
                                                                                                                                                                                                                                                    Entropy (8bit):6.334087823000165
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3072:H5dnvmOEATceozVDkRasOCdUFZrR7beB2SK0XCC+W/ST+BeXZQUC5:ZdnvmsTceZUtCdUFZr9b4KznC5
                                                                                                                                                                                                                                                    MD5:9C7A4D75F08D40AD6F5250DF6739C1B8
                                                                                                                                                                                                                                                    SHA1:793749511C61B00A793D0AEA487E366256DD1B95
                                                                                                                                                                                                                                                    SHA-256:6EB17C527C9E7F7FEA1FDB2EA152E957B50A56796E53CE1E5946B165B82DEAEF
                                                                                                                                                                                                                                                    SHA-512:E85235307B85FFD3AAB76FF6290BEE0B3B9FD74C61A812B5355FE7B854D4C6B77BD521E52638D28E249A43D9EC7AA6F2670AF2B1C671091492C7FE19D6F9A4E6
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$......../.iTN.:TN.:TN.:.6.;^N.:.6.;.N.:.6.;@N.:.6.;UN.:...;AN.:...;DN.:...;{N.:.6.;_N.:TN.:'N.:B..;QN.:B..;UN.:B.%:UN.:TNM:UN.:B..;UN.:RichTN.:........................PE..L...z..f...........!...(.x...................................................`..............................................x...x....0..X....................@......0...............................p...@............................................text...0v.......x.................. ..`.rdata..\~...........|..............@..@.data...............................@....rsrc...X....0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):12288
                                                                                                                                                                                                                                                    Entropy (8bit):5.814115788739565
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                                                                                                                                                                                                                                    MD5:CFF85C549D536F651D4FB8387F1976F2
                                                                                                                                                                                                                                                    SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                                                                                                                                                                                                                                    SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                                                                                                                                                                                                                                    SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                                                                    File Type:GIF image data, version 89a, 16 x 16
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):997
                                                                                                                                                                                                                                                    Entropy (8bit):4.188896534234179
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12:2E5KZbHOjOruFw6MLxENScRVar7FC53tK1Oqd3Aa0n:tAlHOjOX60ENvRVZKbEn
                                                                                                                                                                                                                                                    MD5:1636218C14C357455B5C872982E2A047
                                                                                                                                                                                                                                                    SHA1:21FBD1308AF7AD25352667583A8DC340B0847DBC
                                                                                                                                                                                                                                                    SHA-256:9B8B6285BF65F086E08701EEE04E57F2586E973A49C5A38660C9C6502A807045
                                                                                                                                                                                                                                                    SHA-512:837FA6BCBE69A3728F5CB4C25C35C1D13E84B11232FC5279A91F21341892AD0E36003D86962C8AB1A056D3BEEB2652C754D51D6EC7EEE0E0EBFE19CD93FB5CB0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:GIF89a............P..........4q...5j...O..F.].......................o..._.....5y.t........\....K>}...g..t....X...B..ET....t~....go..Jx...........|..U!f.|....>u.M.........w>..+r...|...A{.....t...E...b.8}....d....A.....R..y..l...w....G5u...{....t.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!..NETSCAPE2.0.....!.......,...............H..A....`pp....~.xR......d.......,...D...)2 .1.....N` R......(@......,8RDA../..XB....P.F .....#...b`F...#8p......<\.`.........A....n|.CH...........+... .E.....d`.@......;
                                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):39424
                                                                                                                                                                                                                                                    Entropy (8bit):4.684597989866362
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:384:njt65uI9oYzcCaHjl9Cb4I1f0AGhrHXoREnRxtIpH/u0abJ2v2DW9O9tk8ZwkpwD:noHtNQoRSIwTJB6Q/kPyBp6
                                                                                                                                                                                                                                                    MD5:A35CDC9CF1D17216C0AB8C5282488EAD
                                                                                                                                                                                                                                                    SHA1:ED8E8091A924343AD8791D85E2733C14839F0D36
                                                                                                                                                                                                                                                    SHA-256:A793929232AFB78B1C5B2F45D82094098BCF01523159FAD1032147D8D5F9C4DF
                                                                                                                                                                                                                                                    SHA-512:0F15B00D0BF2AABD194302E599D69962147B4B3EF99E5A5F8D5797A7A56FD75DD9DB0A667CFBA9C758E6F0DAB9CED126A9B43948935FE37FC31D96278A842BDF
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&.[.H.[.H.[.H.O.I.R.H.[.I...H...M.Y.H...L.Z.H...H.Z.H.....Z.H...J.Z.H.Rich[.H.................PE..L...n..c...........!.....T.........._........p............................... ............@..........................x......D...d...............................t....w..8...............................................D............................text....S.......T.................. ..`.rdata.......p.......X..............@..@.data....i...........d..............@....idata..A............v..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                                                                    File Type:PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):26494
                                                                                                                                                                                                                                                    Entropy (8bit):1.9568109962493656
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24:Qwika6aSaaDaVYoG6abuJsnZs5GhI11BayNXPcDrSsUWcSphsWwlEWqCl6aHAX2x:Qoi47a5G8SddzKFIcsOz3Xz
                                                                                                                                                                                                                                                    MD5:CBE40FD2B1EC96DAEDC65DA172D90022
                                                                                                                                                                                                                                                    SHA1:366C216220AA4329DFF6C485FD0E9B0F4F0A7944
                                                                                                                                                                                                                                                    SHA-256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
                                                                                                                                                                                                                                                    SHA-512:62990CB16E37B6B4EFF6AB03571C3A82DCAA21A1D393C3CB01D81F62287777FB0B4B27F8852B5FA71BC975FEAB5BAA486D33F2C58660210E115DE7E2BD34EA63
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:BM~g......v...(.......:............g..................................................................................DDD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@..DDD....DDDDDD........................................DDDDDDDDDD....DDDDDDDDD........DD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDD@@@@DDDDDDDDDD@@@@@@D..DD....DDDDDDD......................................DDDDDDDDDD....DDDDDDDDDD......D..D@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@DDD..D.....DDDDDD......................................DDDDDDDDD.....DDDDDDDDD......DDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@@DDDD.......DDDDDD.....................................DDDDDDDDDD....DDDDDDDDDD.....DDDDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@DDDDDD.......DDDDDD....................................DDDDDDDDD....DDDDDDDDDD......DDDDDD..@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):9728
                                                                                                                                                                                                                                                    Entropy (8bit):5.158136237602734
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:96:o0svUu3Uy+sytcS8176b+XR8pCHFcMcxSgB5PKtAtgt+Nt+rnt3DVEB3YcNqkzfS:o0svWyNO81b8pCHFcM0PuAgkOyuIFc
                                                                                                                                                                                                                                                    MD5:6C3F8C94D0727894D706940A8A980543
                                                                                                                                                                                                                                                    SHA1:0D1BCAD901BE377F38D579AAFC0C41C0EF8DCEFD
                                                                                                                                                                                                                                                    SHA-256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
                                                                                                                                                                                                                                                    SHA-512:2094F0E4BB7C806A5FF27F83A1D572A5512D979EEFDA3345BAFF27D2C89E828F68466D08C3CA250DA11B01FC0407A21743037C25E94FBE688566DD7DEAEBD355
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L.....Oa...........!.........0......g........0............................................@..........................6..k....0.......p...............................................................................0...............................text............................... ..`.rdata..{....0......................@..@.data...h!...@......................@....rsrc........p....... ..............@..@.reloc..~............"..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):24064
                                                                                                                                                                                                                                                    Entropy (8bit):5.819708895488079
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:384:n7U5CiIZ1ZC2RvhrTfldNuwQ5pk+BISivMyyOgqCoRUj+OvHxOuofnykhVQJrTU:YoZ1ZnhrTfldqk7Yyy94RxOcVQJrT
                                                                                                                                                                                                                                                    MD5:F4D89D9A2A3E2F164AEA3E93864905C9
                                                                                                                                                                                                                                                    SHA1:4D4E05EE5E4E77A0631A3DD064C171BA2E227D4A
                                                                                                                                                                                                                                                    SHA-256:64B3EFDF3DE54E338D4DB96B549A7BDB7237BB88A82A0A63AEF570327A78A6FB
                                                                                                                                                                                                                                                    SHA-512:DBDA3FE7CA22C23D2D0F2A5D9D415A96112E2965081582C7A42C139A55C5D861A27F0BD919504DE4F82C59CF7D1B97F95ED5A55E87D574635AFDB7EB2D8CADF2
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.'..fI_.fI_.fI_3.H^.fI_.fH_?fI_.8M^.fI_.8I^.fI_.8._.fI_.8K^.fI_Rich.fI_........PE..L...`..Z...........!.....>..........E........P............................................@..........................X......@Z..P....p..........................H....X...............................................P...............................text...W<.......>.................. ..`.rdata.......P.......B..............@..@.data...@....`.......R..............@....rsrc........p.......T..............@..@.reloc..H............X..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):42
                                                                                                                                                                                                                                                    Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                                                                    MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                                                                    SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                                                                    SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                                                                    SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Fri Oct 25 14:14:38 2024, mtime=Tue Nov 5 22:14:06 2024, atime=Fri Oct 25 14:14:38 2024, length=3116888, window=hide
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1862
                                                                                                                                                                                                                                                    Entropy (8bit):3.4638748143419673
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24:8bmmvHbP1R/kY0AhR7BqwtkkN6iO/7ViJTvm:8bmo7P1tkqnlqON6iygTv
                                                                                                                                                                                                                                                    MD5:A47AF9CDBF4447C19A3432B83A59DFF3
                                                                                                                                                                                                                                                    SHA1:7C1780D894B056F9C32EB30EE1021F3E644F705C
                                                                                                                                                                                                                                                    SHA-256:374259DF556C3A8CC18CA51199DC919B906DDADCD4C3E3F712BCA448B4CF31CD
                                                                                                                                                                                                                                                    SHA-512:11A9C3DF7DE633198514C42428D40F7E49EE9C9C937BF0BF631754421C1E2C7956886640E73D2C03FE7E59D8F5909768706665AC36F8845ECEC383FEC4E7F288
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:L..................F.@.. .....y..&...Y.i./....y..&..X./.....................0.:..DG..Yr?.D..U..k0.&...&........{.S...:..X./....i./......t...CFSF..1.....eY...PCAPPS~1....t.Y^...H.g.3..(.....gVA.G..k...F......eY..eY......X....................mki.P.C.A.p.p.S.t.o.r.e...D.j.2.X./.YY.y .PCAPPS~1.EXE..N......YY.yeY.....r.........................P.c.A.p.p.S.t.o.r.e...e.x.e.......X...............-.......W............E......C:\Users\user\PCAppStore\PcAppStore.exe..+.....\.....\.....\.....\.....\.....\.P.C.A.p.p.S.t.o.r.e.\.P.c.A.p.p.S.t.o.r.e...e.x.e...C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.P.C.A.p.p.S.t.o.r.e.../.i.n.i.t. .d.e.f.a.u.l.t. .s.h.o.w.M.).C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.P.C.A.p.p.S.t.o.r.e.\.p.c.a.p.p.s.t.o.r.e...i.c.o.........%USERPROFILE%\PCAppStore\pcappstore.ico.........................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):586584
                                                                                                                                                                                                                                                    Entropy (8bit):6.337989770444409
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:BYnWgtbxN7L7kYcMB/cA4hxWbZKcXErHNkQLtZ9wNmCc0r93SFzd7FSAaxXDj5w:BYnWC7sQB/cA4nLrtkWemCn9YBUxXXy
                                                                                                                                                                                                                                                    MD5:693221C78FDC00A0F87FB3D1381308D4
                                                                                                                                                                                                                                                    SHA1:5ABD1481B0918A1815B542BFCB2EAD542C233DB8
                                                                                                                                                                                                                                                    SHA-256:6BB4786AB76767D1F9B2E19FD1A20F2F76CF1BB96127FC26741F2BE609E7680D
                                                                                                                                                                                                                                                    SHA-512:A58F0A1EA54ED94EDF3129088D89F2064F7D93ECD30F9590307963B287C8FF45580DC4D9A48F6D6C4AF72DB6E1E82EEF0EA3E4BF756B93B159C3CDE808041CFD
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................f....f....f...............g.....gH.... ....g....Rich...........PE..d......g.........."....).....V.................@.....................................x....`.................................................P............G...P..PR......X)..........P...T.......................(.......@............................................text............................... ..`.rdata...m.......n..................@..@.data....<....... ..................@....pdata..PR...P...T... ..............@..@.rsrc....G.......H...t..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3116888
                                                                                                                                                                                                                                                    Entropy (8bit):5.959240683924359
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24576:V9kabuTUmENsEyg1IgoPYbvE8C9BHv3QJTbiNG8g9MEiYQgsSryyH2mtJXKMCSd+:V5bGEXi8mPY9pMFxu7cnZN3
                                                                                                                                                                                                                                                    MD5:4B88D8ADA8D22622C30D581FC38EAA52
                                                                                                                                                                                                                                                    SHA1:0980A7B75DB94035A5DE1696210648ACB95ACEDE
                                                                                                                                                                                                                                                    SHA-256:D4DE255AE1109391E4A4A967A8AD66DFB70FCCA7DB47777E40815F4E7B19F2A2
                                                                                                                                                                                                                                                    SHA-512:0F87422498ED3C60ED21CDA492D038D10509E3B40E5E9D7614B6CB0EF903E241AD1BA9C2F67B43D9DA3980990735A5E0C325002E43E0A41CB12947E2DBECF19F
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l4 O.ZsO.ZsO.Zs.uYrG.Zs.u_r..Zs_.^r\.ZsFu.sM.Zs_.YrC.Zs_._r$.Zs.u^rX.Zs.u\rN.Zs.u[rf.ZsO.[s..Zs..^rM.Zs.._r~.Zs...sN.ZsO..sN.Zs..XrN.ZsRichO.Zs........PE..d......g.........."....)..&..........+"........@.............................P0....../...`...................................................*......./.P^....-......f/.X)... 0..&..0").p....................$).(.... ).@.............&.H............................text.....&.......&................. ..`.rdata...`....&..b....&.............@..@.data...H.... +.......+.............@....pdata........-.......,.............@..@.rsrc...P^..../..`..................@..@.reloc...&... 0..(...>/.............@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):146
                                                                                                                                                                                                                                                    Entropy (8bit):4.577360416859904
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:TKPyFfliFRNAl2sIaRjyM1KOTxLELMZ4MKLJF8EelYq8AsXJVVWM4v:TyyFflmSssI+j1NLELM6MKn8EquZVVCv
                                                                                                                                                                                                                                                    MD5:2845450EA9D938CFEA9809CA0C827F12
                                                                                                                                                                                                                                                    SHA1:8DE2189530DA5923365436C37E4C55C500AC3FBF
                                                                                                                                                                                                                                                    SHA-256:7FDADB3CA5B81C6D1C58A20610921BF89D63DC65B77BE982F422C6FD2A13F166
                                                                                                                                                                                                                                                    SHA-512:7D19FE6E9DD51BB880FD6FBB7EE126C8078771EE5166D53F312B04D117CE2897CBB6DFB5E5627314C3CF8B56F7A2BBF5B9D38258E7912B0AC5D420B611B7C363
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:Fhis folder contains the PC App Store for Microsoft Windows.....For additional information, please visit https://pcapp.store/?p=lpd_appstore-faq..
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2342
                                                                                                                                                                                                                                                    Entropy (8bit):5.165083330546471
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:48:YZ1HdvZToD70MIZl0N1pR4s5oqY01vz6Zp8yEHJcFPai6+zmC2FEkM9S59AkW:oNdxfZl0rpR4s5oA1WZp8yCJcFPaiLzL
                                                                                                                                                                                                                                                    MD5:C2FA9D87416E27FD33D15095A1568DEF
                                                                                                                                                                                                                                                    SHA1:38B476C83C2195BEB02CE633A5A56DDDAC988693
                                                                                                                                                                                                                                                    SHA-256:4452825472438CAA6BA5DC1E2907D963B5B67B831C916D071E3F255953EF19C7
                                                                                                                                                                                                                                                    SHA-512:F37D6DE5343B67E60B57E68342E1AA722A09026F89025C58A295322DA6F1552161F810AC8D52725AD9AF58AE2941DBE72E49E794085205E0A697D3008D9F3982
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20230103113911%2E000000%2B060","os_processes":"197","os_architecture":"64-bit","os_virtmem":"33059700","os_mem":"16282484","cpu_name":"Intel%28R%29+Core%28TM%29+i9-9900K+CPU+%40+3%2E60GHz","cpu_maxclock":"3601","cpu_cores":"8","cpu_logicalproc":"16","pc_vendor":"To+Be+Filled+By+O%2EE%2EM%2E","pc_version":"To+Be+Filled+By+O%2EE%2EM%2E","gpu_name":"Intel%28R%29+UHD+Graphics+630","gpu_ram":"8336631808","gpu_bitsperpixel":"32","gpu_x":"1920","gpu_y":"1080","disk_name":"TS512GMTS430S","disk_size":"512105932800","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20200420000000%2E000000%2B000"},"pcapps":{"0":"Microsoft+Office+Home+and+Business+2019+-+en-us","1":"Mozilla+Firefox+%28x64+en-GB%29","2":"Mozilla+Maintenance+Service","3":"Windows+PC+Health+Check","4":"Microsoft+Update+Health+Tools","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component","7":"Upd
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):73
                                                                                                                                                                                                                                                    Entropy (8bit):4.089026662492467
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:YGVE8fptxgDQLRv6zjQJNRvUXZ5:YGFRt9IoNaZ5
                                                                                                                                                                                                                                                    MD5:3024A54E0C352ABE5EB5F753CA4828DA
                                                                                                                                                                                                                                                    SHA1:DF0206851654405C8E5C2D3BC96FB536B8C2DCBF
                                                                                                                                                                                                                                                    SHA-256:3CD0A703506C7394D6115D9FF721516560894358AEF07459F30D8930DF6C3B61
                                                                                                                                                                                                                                                    SHA-512:D9D44051DF56B29AA596EE38463B781DBE27F917F7DAE1B2420122616DA108520429DDA58C75C7E6B2D41093F83C5A4BAE96024885AF3956F23A3CE5BD3F9358
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"cpg":"default","inst_excl":null,"inst_addon":null,"inst_advanced":null}
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):93880
                                                                                                                                                                                                                                                    Entropy (8bit):6.891280387415397
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:1536:2msAYBdTU9fEAIS2PEtu3rLFn22G9RowU49TV1Z43kUFInU73ALu:FfY/TU9fE9PEtubZrMtkkxUUi
                                                                                                                                                                                                                                                    MD5:CD8B6F1BD281C288FB3F68925639B424
                                                                                                                                                                                                                                                    SHA1:25EA108C45905418B8FDA2FCCF5ADA0EDE2710E5
                                                                                                                                                                                                                                                    SHA-256:808FE10CBF09F21359E1D61860BFCDDE553F5CDA38723ECD0636FA25F652121D
                                                                                                                                                                                                                                                    SHA-512:A05C60EA499BEA246FF0CB3308108862CDC56BC44A4E14F546FE8AF4C52172F73F5973EBA03FF1F2BB1C575C15BF62421034C02AFA703D093B986F95A999E1B6
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 29%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@.......................... ......f.....@.............................................HO..........`E..X)...........................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata... ...............................rsrc...HO.......P..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):276312
                                                                                                                                                                                                                                                    Entropy (8bit):6.155274238783893
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3072:JNh5y0IKTcOq1wpRsrIA/uuNT4KddgLA/exq10mMfnW9L/or6RMr4T+cnOMX4Hen:jyJKA5KKdWLA/GZhnWlV94+3H3
                                                                                                                                                                                                                                                    MD5:11F3801CB9FF046D6075F681971C4EB8
                                                                                                                                                                                                                                                    SHA1:91572872A265185E7F9793B50C5257B511707B36
                                                                                                                                                                                                                                                    SHA-256:5BD22345C42FC1B7C89C281C9247BC81DBBDB4C8EF4DA76E2A9D86589D8CC118
                                                                                                                                                                                                                                                    SHA-512:B7E1A5F391E112AAC0CFA8239AD5AE784161C8734C9A4F3EF386FF617915F7AC769A5DB790B66BD95E6DAB8BAABCC4E51DE31D614193CB69909DF393DC77A021
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........P........................H............Q.......Q.......Q..................t....P.......P&.......N......P......Rich............................PE..d......g.........."....).............,.........@.............................p...........`.....................................................x........G.......1......X)...`.......O..p....................Q..(...PN..@............................................text............................... ..`.rdata..............................@..@.data....%...........|..............@....pdata...1.......2..................@..@.rsrc....G.......H..................@..@.reloc.......`......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\PCAppStore\PcAppStore.exe
                                                                                                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):121016
                                                                                                                                                                                                                                                    Entropy (8bit):7.2821762471192875
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3072:dbG7N2kDTHUpout88qf4LuPzy5n+dmEmGCKPUY:dbE/HUiFry5n+3QY
                                                                                                                                                                                                                                                    MD5:85F2849F25944FC15E58521A52B800FF
                                                                                                                                                                                                                                                    SHA1:718D11673DE4743835523983AB5E06F88785A03D
                                                                                                                                                                                                                                                    SHA-256:C4942BAD2EAACA0BB5ED7E6900D6C85F12F0DB6DE790072838CE3F854B9AD677
                                                                                                                                                                                                                                                    SHA-512:F5723F93695E84FC41F48F0153F024249E9ABC9FD03D788AF1C31D6084ACFBE4C85A76DE55AB8BE4F68D16807BC0381C269CC3834510D538E9710F528B04BEB7
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 18%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j..........-5............@..................................*....@.............................................XO..........H...p)...........................................................................................text....h.......j.................. ..`.rdata...............n..............@..@.data...............................@....ndata... ...`...........................rsrc...XO.......P..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2312704
                                                                                                                                                                                                                                                    Entropy (8bit):6.449649685576397
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:49152:gg6wrmvfu6ZPfRFq8BcvDEzT3CuaMUgKS:H8Zn3Ci
                                                                                                                                                                                                                                                    MD5:E472E46BDFD736351D4B086B4C4CA134
                                                                                                                                                                                                                                                    SHA1:1AA886F0CB23B3D322A43BE797D411FCA84D82A7
                                                                                                                                                                                                                                                    SHA-256:E825A252B5C5C9C2DE8A6A6ADE12A7F9CD0040F6A20E6EE44BA659034E6D5223
                                                                                                                                                                                                                                                    SHA-512:173F5A7ABDFEA01C9C21EC716CBA14EEC4539DA45E5734B3FD1E0688E1C22E4718BD701C25C8040D20CF48867E2A67EF2ABA46380BAB9AB1F7A42BD66FD33AFB
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........."..........R.......R.........@.............................0$...........`.........................................',.......,..d....0........................$.@!..l...8...................@...(.......8............4..........`....................text...X........................... ..`.rdata..............................@..@.data............F..................@....pdata..............................@..@.gxfg...P........0..................@..@.retplne.............N...................tls.................P..............@....voltbl.D............T..................CPADinfo8............V..............@..._RDATA...............X..............@..@malloc_h0.... .......Z.............. ..`.rsrc........0.......\..............@..@.reloc..@!....$.."...(#.............@..B................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):9560433
                                                                                                                                                                                                                                                    Entropy (8bit):4.8475056659478915
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24576:/28lTEaiPJK0PJgVEv+F26vbV2f2EvYvAKMc/+uBPJ1PJLPJ1PJOPJDKspVosXxY:/2ETWgqSq+sIp2+qO1McdLRPiY2zXO
                                                                                                                                                                                                                                                    MD5:7A32B7C762C76BD3EE38E3E998705899
                                                                                                                                                                                                                                                    SHA1:E1C611A57115374A48CD84619BD06E43021B7352
                                                                                                                                                                                                                                                    SHA-256:726276A62DB14DD751F32B77200E90A8000712BD256ED038BEA928C6AEF0C892
                                                                                                                                                                                                                                                    SHA-512:9FE66FE4479915B0EFE12ADFB386BA251B2C2AF8CCD92B4D67F61C9D2AE537C6D3512E4379AFF10EAB3CD433FC1EDEC702E63DDFE4F83769A746FF249288D4DA
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview: Generated by licenses.py; do not edit. --><!doctype html>..<html>..<head>..<meta charset="utf-8">..<meta name="viewport" content="width=device-width">..<meta name="color-scheme" content="light dark">..<title>Credits</title>..<link rel="stylesheet" href="chrome://resources/css/text_defaults.css">..<link rel="stylesheet" href="chrome://credits/credits.css">..</head>..<body>..<span class="page-title">Credits</span>..<a id="print-link" href="#" hidden>Print</a>..<label class="show show-all" tabindex="0">..<input type="checkbox" hidden>..</label>..<div class="open-sourced">.. Chromium software is made available as source code.. <a href="https://source.chromium.org/chromium">here</a>...</div>....<div style="clear:both; overflow:auto;"> Chromium <3s the following projects -->..<div class="product">..<span class="title">2-dim General Purpose FFT (Fast Fourier/Cosine/Sine Transform) Package</span>..<span class="homepage"><a href="http://www.kurims.kyoto-u.ac.jp/~ooura/fft.html">h
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4916712
                                                                                                                                                                                                                                                    Entropy (8bit):6.398049523846958
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:49152:KCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvhiD0N+YEzI4og/RfzHLeHTRhFRNc:xG2QCwmHPnog/pzHAo/A6l
                                                                                                                                                                                                                                                    MD5:2191E768CC2E19009DAD20DC999135A3
                                                                                                                                                                                                                                                    SHA1:F49A46BA0E954E657AAED1C9019A53D194272B6A
                                                                                                                                                                                                                                                    SHA-256:7353F25DC5CF84D09894E3E0461CEF0E56799ADBC617FCE37620CA67240B547D
                                                                                                                                                                                                                                                    SHA-512:5ADCB00162F284C16EC78016D301FC11559DD0A781FFBEFF822DB22EFBED168B11D7E5586EA82388E9503B0C7D3740CF2A08E243877F5319202491C8A641C970
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........|3..]...]...]..e\...]...\.5.]..e...]..wX...]..wY...]..e^...]..eX.y.]..eY...]..e]...]..eU./.]..e....]..e_...].Rich..].................PE..d...^.}`.........." ......8..........<).......................................K.....:FK...`A........................................`%G.x....(G.P.....J.@.....H.......J..%....J.....p.D.p....................S<.(...pR<.@............S<.(............................text.....8.......8................. ..`.rdata...F....8..P....8.............@..@.data...`....@G......@G.............@....pdata........H......@H.............@..@.rsrc...@.....J......@J.............@..@.reloc........J......PJ.............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2028032
                                                                                                                                                                                                                                                    Entropy (8bit):6.64708834859118
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24576:x+QrVq8lxXjKAri3/8XLpvdZ4RAfdDY0K1w/cjWsdSJNTtMfxTCC:pdlNBfXt16RsFY0K3jWsdQVtM0C
                                                                                                                                                                                                                                                    MD5:5FFF6F0423A38BFAF174CB670650F4F9
                                                                                                                                                                                                                                                    SHA1:13ECD1C4784A5A178A998E9FC0DC08F556121712
                                                                                                                                                                                                                                                    SHA-256:D4E6FC4E1BC6CB5B3EF7010E61D3A65E97804FB20346CEE657688339075B2727
                                                                                                                                                                                                                                                    SHA-512:E6FF0EA9F6196470F6E094D0AB655FB527C28FC2B2A5D126A10C1F4185C0DFF5ED4F19E7ED717D67DF324562B7AA56ED87AA0BD396A6BA722D3141B9F30FC41B
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .........D......0.........................................c...........`A.........................................T.......Z..(.....c.0.....b..|............c..2...<..8....................;..(....<..8...........8^..`............................text............................... ..`.rdata..\7.......8..................@..@.data....D......"..................@....pdata...|....b..~..................@..@.gxfg....,....c.....................@..@.retplne.....@c..........................tls.........Pc.....................@....voltbl.8....`c........................._RDATA.......pc.....................@..@.rsrc...0.....c.....................@..@.reloc...2....c..4..................@..B................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):10717392
                                                                                                                                                                                                                                                    Entropy (8bit):6.282534560973548
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:196608:hpgPBhORiuQwCliXUxbblHa93Whli6Z86WOH:n8wkDliXUxbblHa93Whli6Z8I
                                                                                                                                                                                                                                                    MD5:E0F1AD85C0933ECCE2E003A2C59AE726
                                                                                                                                                                                                                                                    SHA1:A8539FC5A233558EDFA264A34F7AF6187C3F0D4F
                                                                                                                                                                                                                                                    SHA-256:F5170AA2B388D23BEBF98784DD488A9BCB741470384A6A9A8D7A2638D768DEFB
                                                                                                                                                                                                                                                    SHA-512:714ED5AE44DFA4812081B8DE42401197C235A4FA05206597F4C7B4170DD37E8360CC75D176399B735C9AEC200F5B7D5C81C07B9AB58CBCA8DC08861C6814FB28
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:...'........CmnD........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html ......E.......E.......E..P/...E.../...E..P7...E...7...E...h...F...h.. F..Pi..0F......DF.....WF.....jF..P...}F.......F..`....F.......F.. ....F.......F..0....F.......G......G......(G.....;G..@...NG......aG.....tG.......G.......G..@....G.......G.......G.......G..P....G.......H.......H..P...2H......EH..`...UH......hH......yH..P....H.......H.......H..`....H.......H.......H..P....I.......I......-I..@...=I......PI......aI..@...uI.......I...0...I.. 1...I..p1...I...e...I...e...I...i...I..`i...J...i..)J...K..BJ..p...^J..."'.uJ..P.'..J....'..J...5'..J..06'..J...>'..J..P?'..K...D'..K...F'.0K...H'.IK...V'.hK....(..K....(..K..P.)..K....)..K..pW*..K..P.*..L...*+.?L..p.+.bL....+..L...U,..L....,..L....,..L....,..L..@.,..M....,.-M..P.-.IM.. e-.`M...e-.~M...R/..M.../..M..0.0..M..@.0..M..P.0..M....0..N....0.!N...,0.9N...,0.NN..0-0.fN...-0.vN...Y0..N...Z0..N..
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):454144
                                                                                                                                                                                                                                                    Entropy (8bit):6.3485070297294985
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:yLSe7mxAked1dLX9ValhL1IA9SbD/9PAE:yExAkedHLX9VC9OKE
                                                                                                                                                                                                                                                    MD5:7255FCCD39F330CA2123F380B4967E0A
                                                                                                                                                                                                                                                    SHA1:C8E0E1A3E129DF7AB8922F039FFDBBA20DFBA8E2
                                                                                                                                                                                                                                                    SHA-256:22C2E5452FB01513C331B9E88313830C96EB3E554FAB942AFCBD6FB8702DF730
                                                                                                                                                                                                                                                    SHA-512:ECD66B0A43AEFD2C4721CD574D2394A2A9069B5258E310A0FC16C3919FD2505BFE91DB2FF8E4B5C7EF0187C86B167004659D15943F5BE6DF42BBFC297FB42119
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .................7....................................................`A........................................`...h.......(.......x........A..............(...L...8...................0...(....)..8............... ............................text...2........................... ..`.rdata...}.......~..................@..@.data....O...`... ...H..............@....pdata...A.......B...h..............@..@.gxfg...`%.......&..................@..@.retplne.....0...........................tls....!....@......................@....voltbl.8....P.........................._RDATA.......`......................@..@malloc_h0....p...................... ..`.rsrc...x...........................@..@.reloc..(...........................@..B........................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):8058880
                                                                                                                                                                                                                                                    Entropy (8bit):6.448026576223661
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:98304:XUoMnbHa6h5CmPt75W2+G15kI6a7Xm3rC:gDTCe4rt/aTCr
                                                                                                                                                                                                                                                    MD5:6CD8726BEEFCFA69B48EAB1362A5CAD5
                                                                                                                                                                                                                                                    SHA1:F4249179B86C0A870C55E6C5A263180C77017E81
                                                                                                                                                                                                                                                    SHA-256:2636DA528EDCAEC9834255A92411BD5DA921D793825D74CEB997E336A0DBD393
                                                                                                                                                                                                                                                    SHA-512:0F6600315B0E1B5371BB39290E5417EBAA0F3C7FB47EEF32D73AFCE299722A426DD244FD3775D88FCEB6F170F16B23B099244EE825F7F8185D58F1BF28583515
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." ......^...........Z.......................................{...........`A.........................................2r.......s.d.....z.......x.HX............{.|...$.q.8.....................q.(.....p.8.............s.....@1r.@....................text.....^.......^................. ..`.rdata..d....0^.......^.............@..@.data.........s.......s.............@....pdata..HX....x..Z...pw.............@..@.gxfg....,...pz.......y.............@..@.retplne......z.......y..................tls....Q.....z.......y.............@....voltbl.D.....z.......y................._RDATA........z.......y.............@..@malloc_h0.....z.......z............. ..`.rsrc.........z.......z.............@..@.reloc..|.....{.......z.............@..B........................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):502905
                                                                                                                                                                                                                                                    Entropy (8bit):5.409605383978337
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:Mqyim2uho5EnirXKhaG1B2+H2JynyaH4IFzZo0vgElgA2W0PSq+2ss30fzO75g6p:U2uhounkXyd1B2+H2JynyaH4IFzZo0ve
                                                                                                                                                                                                                                                    MD5:8032CB8A1B40AC85ACBEAFD6514BE668
                                                                                                                                                                                                                                                    SHA1:EE15C360BD913FFEC94E9E36224548CA83B2564C
                                                                                                                                                                                                                                                    SHA-256:1762EB36E254C02A50ED089ED737235FD7A64C0D234581612ACA56F6398CAC97
                                                                                                                                                                                                                                                    SHA-512:956241DA1EE60C648417C6BF3921554F1F19AB17163DBDA764AE0DC21E1729C9357BFB900B1F948D2C649F9D53DA7CEFF3128B8CFAB34FD03053A8C37C663F5D
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........$&).e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.(...y.....z.=...|.C...}.U.....].....b.....j.....r.....z.................................................................Y.................&.......................).................H.....]...........#.....X.....q.................9.....G.......................*.......................4................./.....L.................:.....L.................6.....E.................T.....j...........R.......................G.....d.....u.................,.....9.............................I.......................?.......................%.....m.......................6.....].....f.................(.....1.................`.....w.................:.....R.......................5...............................................P.............................~.......................~...................................p.................] ..... ..... .....!.....!.....!.....!....."....Y"....}"....."....."....9#....d#
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):813426
                                                                                                                                                                                                                                                    Entropy (8bit):4.915984741122479
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:dTZog2ule8/xHT9KG3Sj+KRRz0l85X9icV03OzP+Xx30jH8+j:/ogg8/xpKGCj+KRRz085X9icV03OzP+W
                                                                                                                                                                                                                                                    MD5:7B88BD642C86EC4D4FB9A5614D1DA63F
                                                                                                                                                                                                                                                    SHA1:92CF23267B78039E2413F7F7F90E6636614A0C5C
                                                                                                                                                                                                                                                    SHA-256:0C1DE970426BA291B10CD08FF0E6B078ADF4C1D07B24E0D89D9322FD2EC2E296
                                                                                                                                                                                                                                                    SHA-512:17E2381491A8844D1AD6910C3876C817ADE5CF2DAD8461771BAE9E967F7F64954917E20F8258CE6548AF1C21F8CF7E9477C7BCDCE6DD216140BF4D32410A31D9
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........?&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.%...s.6...t.?...v.T...w.a...y.g...z.v...|.|...}.....................................................................................0.....O.....$.......................u.....-.......................i................................... .................\.....o...........h.................f...........7.....g.....J...........\........... .............................\.............................r...........l.....+.................Z.......................z...........".....5.................B.....U.......................?...........o ..... ..... ....r!.....!....Q"....g".....".....#.....#.....#....l$.....$....6%....F%.....%.....&...."'....H'.....'....;(....u(.....(....!).....).....).....).....*.....*....C+....\+.....,.....,.....,....E-.....-....'.....`............/...../...../.....0.....0....A1.....1.....1.....2....`3.....3.....4.....4....y5.....5.... 6.....6.....7.....7.... 8.....8.....8.....9.....9.....9....p:.....:
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):822020
                                                                                                                                                                                                                                                    Entropy (8bit):4.925237393732045
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:vFB3t9DiYK8a4HHFLrgOIPcd1CyWpQ5fuiDbmpQ:vn3t5SzU5fu+
                                                                                                                                                                                                                                                    MD5:621B390B8AF0C70D682715323A92B61F
                                                                                                                                                                                                                                                    SHA1:C34B2F2C91CD0786FEBBD26223D1CB096A87C1F4
                                                                                                                                                                                                                                                    SHA-256:729B677BE93020DDEF1297869CA7378D3A102927294C634A1087D63F48FB8A79
                                                                                                                                                                                                                                                    SHA-512:E55691ED5FBCEF7AA8330CABDA72E9D803E12784B661A42FFE3FF725FE663AEF62EED407FDC2269135437AB7AE047A6F0CCEAA90F2349073E554DD45C5F9D0BC
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&g.e.....h.....i.....j.*...k.9...l.D...n.L...o.Q...p.^...q.d...r.p...s.....t.....v.....w.....y.....z.....|.....}.........................................................................3.....N.....j...........].....!.................t...........p...........S...........}...........R...........J.....q.............................x...........H.....a...................................n.......................4.................A...........%.....A...........q.......................g.............................&.....G...........D.................!.............................A.................^ ..... ....R!....j!.....".....".....".....#.....#....,$.....$.....$....2%.....%.....&....5&.....&.....'.....(....E(.....(....P).....).....)....W*.....*....%+....R+.....+.....,.....,.....,.....-......................D/...../...../...../.....0....:1.....1.....1....o2.....2...._3.....3....s4....J5.....5.....6.....6....Y7.....7.....7.....8....'9....}9.....9....!:.....:.....:.....;.....;....M<.....<
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):897122
                                                                                                                                                                                                                                                    Entropy (8bit):4.928723053414015
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:CIPFaBsPG/d/RXZwRq4fvPU7XUUk/K58N0j+JzIQ4pF:CIvAAC5h+c
                                                                                                                                                                                                                                                    MD5:3C8E3C5B1D029E9A01943DDBA053C37F
                                                                                                                                                                                                                                                    SHA1:785EE0C46B11A19C80770F2B310057E59D90C2E1
                                                                                                                                                                                                                                                    SHA-256:98CD654847FF28C0EE580A7374276EE5BD2A38DDE8F45ADFBACBD7917E4C026D
                                                                                                                                                                                                                                                    SHA-512:DCA2FC0BE678BEBF047DBAA5A71C01AD57F9B463E3F80DBFABC0937BCFDCEEFC8AE84FD415C40D0B6B713FFF24CEBFB84373ECDDE3741F78265E082C5B9951D0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%Q.e.>...h.B...i.M...j.Y...k.h...l.s...n.{...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................%.....-.....4.....;.....B.....D.....I.....b...................................o...........,...........#.....E.......................0.......................$...........?.........................................x...........\...........\...........n...........s.....C.......................(.....{...........J...................................4.....s.............................r.................1...........;.....{...........K...... ....u ..... .....!.....!.....!.....!.....".....#....r#.....#.....$.....$.....$.....$....w%.....%....C&....X&.....&.....'.....'.....(.....(.....)....C)....i).....)....d*.....*....C+.....+....:,....X,.....,....{-.....-......................./.... /...../....C0.....0.....0....91.....1.....1.....2.....3.....3.....4.....4.....5.....6....e6.....6....+7.....7.....7.....8....g8.....8.....8.....9.....9....k:.....:.....:.....;
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):927865
                                                                                                                                                                                                                                                    Entropy (8bit):4.686646990438899
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24576:4Tax7YKC3cquMMLYzzQkECPUwVbtbHp373ZL+3aAKHkVDYyKzumpod2nm5g0XuGq:W8C3cquMMLYUKUwVbtbHp373Zq3arkV8
                                                                                                                                                                                                                                                    MD5:27C55B97D549BCF13145EC75F0A503CA
                                                                                                                                                                                                                                                    SHA1:4D7BEC85366FBB602EB6FC02297FB402BD40B6BF
                                                                                                                                                                                                                                                    SHA-256:F2EB47878B5D34589A2AFC2E74AB346003BF4D2C450230B9CFD084935BB54A4D
                                                                                                                                                                                                                                                    SHA-512:CA3ABB2403B8A67A53F2156E11C361B137F45378737E39D45D5F77148FF3CD031E37DB9EA144B76749667CBA20698C2049E86CA5927475B1E22112751B9BDF3F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........$&).e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.(...y.....z.=...|.C...}.U.....].....b.....j.....r.....z................................................................. .............................K...........................................................V.........................................^...........p...................................&.....n.....X.............................L...................................I.....\.....5.......................E ..... ..... ....R!.....!....5"....]".....".....#.....#.....#.....$....?%.....%.....%....h&.....&....<'....['.....'....n(.....(.....(....g).....)....#*....I*.....*....|+.....+.....+.....,.....-....}...........Y/...../....'0....W0.....0...._1.....1.....1.....2....w3.....3.....4.....5.....5....06.....6....L7.....7.....8....A8.....9.....9.....:....8:....&;.....;....;<....p<....`=....;>.....>.....?.....?.....@....7A.....A....LB.....B....?C....wC.....D.....D.....D.....E.....F.....F....hG
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1193463
                                                                                                                                                                                                                                                    Entropy (8bit):4.299730648702171
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3072:o3d2APzZl1uPXdf826YBWviytaGHFGuzhr0Ylf14/QISydDbrK8VBbFKQg51lNDS:o3d3Fl18fPAtt1MFSydHrK8VBbG5llA
                                                                                                                                                                                                                                                    MD5:7351AE61AE5884088AE68CE5BE0043D8
                                                                                                                                                                                                                                                    SHA1:DBEEA5DA228F63A405548F0E6F82FBBB3D624058
                                                                                                                                                                                                                                                    SHA-256:D367339A1AC5CE27E58AA03D33E567C06C02F4AC87DB26ACA5D8A3D915AAA01A
                                                                                                                                                                                                                                                    SHA-512:85D5D0372C162DE8660B4A8A4EC493585C6C3D29F999F1734C319532DB572A13C91C87320BE139F9FFA957ADD52CDC36584226FAF5AFC39F8A82A2E9C146156B
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........%&(.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.'...w.4...y.:...z.I...|.O...}.a.....i.....n.....v.....~.......................................................................Y.................I...........z.....Q...........*.....O.....I...........F.....>.............................G.......................G.............................Q.................t...........Z.....I.............................K.............................]............ .....!....Q"....."....n#.....$....L$.....$....'%.....%.....%.....&.....&....H'....{'.....'....~(....-).....).....).....*....(+.....+.....+....s,.....-....g-.....-....5...........!/....D/...../.....0.....0.....1..../2....K3.....4....^4....X5....'6.....6.....6.....7.....8....L8....|8....J9.....:....w:.....:.....;....d<.....<....s=....->.....>.....?....??....$@.....@....-A....eA....hB.....C.....C.....C....)E....}F....pG.....G.....H.....I.....J.....J.....K.....L.....L....0M.....M.....N....7O....fO....lP....@Q
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):573774
                                                                                                                                                                                                                                                    Entropy (8bit):5.391859865204477
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:gQQL7QREpAp973K5PqF4N3Mw2juwHzejm0t3lvqbETX9/RSHhIsjcmlLEYuCJkdz:hb9zaBRnvWDMN8UpOO5k/mVb
                                                                                                                                                                                                                                                    MD5:F6E50323E0C5A657EBDC2FE7285C15F6
                                                                                                                                                                                                                                                    SHA1:944356D207A7962A81801BB76B0E2C5226FF7F1E
                                                                                                                                                                                                                                                    SHA-256:DE474CF24B68B6D862C96B8057EDE3F53C6F63C46532E4988E9D1979B1CF59DA
                                                                                                                                                                                                                                                    SHA-512:8BC4EA1E2EB03E0423A7C3008BF6001B904928B5B7D7E84D61469C8D8CDBD34E9A4FFFA900B7CBF4216FBA3A469D7A26AF9C22E618902C28044F426693B09EC7
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........"&+.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.$...y.*...z.9...|.?...}.Q.....Y.....^.....f.....n.....v.....}.................................................................9.................3...................................n.................P.......................T.......................K.....~.................y.................n...........$.....J.................^.....r...........,.....c.....w...........U.................Q...........5.....[.................<.....X.......................(......................................... .....5.......................1.............................[.......................>.......................^.................0.......................3.......................V.......................t.................Z.................. ....7 ..... ..... .....!....(!.....!.....!....6"....R"....."....w#.....#.....$.....$.....$....0%....Z%.....%....)&....\&....|&.....&.....'....='....P'.....'....((....h(.....(
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):583431
                                                                                                                                                                                                                                                    Entropy (8bit):5.838398613999325
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:eV2UufpvPlAhTbe65aU8rwsiNOA3SzmPN:eV2UufpvNAhHh5aU8rvYOrzmPN
                                                                                                                                                                                                                                                    MD5:7F1AD2897B210C4C25CFBDF0736F6809
                                                                                                                                                                                                                                                    SHA1:62E0335A63BC9E2AE8A9826E08256B00E433D9F5
                                                                                                                                                                                                                                                    SHA-256:E0826C8E2FE737307D09D808BC693A397E0F1E093AC249B24CEB48327685A4A4
                                                                                                                                                                                                                                                    SHA-512:C656B1FF7FCD93B3AEF5FC9E91373D0588520546EAF6CB5E2F965FD66ED0D60E2C04FB22155723D6EFDFDB377EF98CD6420F9944C5B0FC4AE8DE14C830A05B15
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&;.e.j...h.n...i.v...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.1.....9.....>.....F.....N.....V.....].....d.....k.....l.....m.....o.............................T...........G.....e...........).....^.....m...........p.................V.......................{.................$.....w.......................z.................7...........H.................$.......................N.......................w...........2.....G...........B.......................Q.....n.................*.....V.....h................./.....@.................F.....Z.................R.....d.................9.....F.................H.....[...........*.....d.....x...........m.......................`.....{.................0.....Q.....p...........7.....c.....y...........Y.......................w.................. ..... ..... ..... ....I!.....!.....!....."....t"....."....0#....B#.....#....T$.....$.....$....2%.....%.....%.....%....<&.....&.....&.....&....@'.....'.....'
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):530651
                                                                                                                                                                                                                                                    Entropy (8bit):5.44607278354406
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:QnPhyMLsqSAzVWgss5sbse814eBjtwlRDdJwL2obEXZaFRQ5gk2rp/b3d4nTGqF5:WDgxsJjiT55g/r2Tpj
                                                                                                                                                                                                                                                    MD5:9D6A98D53208092F687AD7BB3DBAED7D
                                                                                                                                                                                                                                                    SHA1:161D0689CA85147B356167F98EAD84783E331986
                                                                                                                                                                                                                                                    SHA-256:04BF402123BFA1C7E256A62A666C0488A42ACEB585C1A9A744341EBC6FDD9A7C
                                                                                                                                                                                                                                                    SHA-512:B85832A3DBF5C97870683A655E2CB0F00C04DA4907644561894BB34DE9756334E60CAF75F0CB42E43692BF00C5EF3CFBE6D2E8F7802FFED8E6948757D2DE3E5A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........&&'.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.(...w.5...y.;...z.J...|.P...}.b.....j.....o.....w.............................................................................\.................".................@.....X...........d.................1.......................1.............................x.......................y.................<.......................w...........#.....6.................C.....W...........`.................]...........5.....[.................8.....J.......................#.....q.......................\.......................b.......................[.......................?.......................!.......................-.......................t.......................X.......................3.......................0.......................n.......................n............ ..... ..... ..... .....!.....!.....!.....!....:"....H"....."....Y#.....#.....#....%$.....$.....$.....$.....%....d%.....%.....%.....%....O&.....&
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):571551
                                                                                                                                                                                                                                                    Entropy (8bit):5.489447532911186
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:if1WFbCgp1nHaxa03K7UpKD93g/ahmOC2GzV6wAXaOV5jbt5sRqJoUaM5QIBCAL:wQAgnp03K7Up4g/a01JE3t5yUfvBCAL
                                                                                                                                                                                                                                                    MD5:851D55585CBC90143DD4C70EB4900574
                                                                                                                                                                                                                                                    SHA1:DA5DBD04CFEFE63D1DB69D7C6E19DAC34F379C39
                                                                                                                                                                                                                                                    SHA-256:DDBAFE037C6E7509650373D084BC0F198D3ABB7BFD93FAEDD5595F1B354EDC32
                                                                                                                                                                                                                                                    SHA-512:B1718430F3540F2455E93A1F6C47E92D7FEA99A9943E8C585EBD4DD807B5A4C1172BBDC83D434EE806C5FC3875B60D7EBDEB933D1CDE6DB50DCED9C0DAAFCD04
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.0...t.9...v.N...w.[...y.a...z.p...|.v...}.........................................................................................................................{...........;.....P...........H.................).......................e...................................:.....N...........T.................=.................!...........".....\.....m...........o.................V...........<.....V.............................z.................".................%.....7.................6.....G...........T.................!.......................S.......................|...........&.....5...........'....._.....q.............................w.......................q.................. ....o ..... ..... .....!.....!....)"....b"....."....."....c#.....#.....#.....$....}$.....$.....$....H%.....%.....%.....&.....&.....'....b'....l'.....(.....(.....(.....(....e).....).....*.....*.....*.....*.....+....)+.....+....(,....`,
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1016551
                                                                                                                                                                                                                                                    Entropy (8bit):4.766567786580532
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24576:WStxYcxPdGgxh1hxFFiL9+YJXDsSaSmqHuuD2Np6P4j/MAVH8yeVd85tRDQr3egJ:TtxYcxPdGgxh1hxFFiL9+YJXDsSaSmqv
                                                                                                                                                                                                                                                    MD5:F497F06BC0430F2FA1E2BFFC32E2B9C5
                                                                                                                                                                                                                                                    SHA1:38141C3F85FD4A8FCF2A82B0DEB68BD93F062F60
                                                                                                                                                                                                                                                    SHA-256:B3CB15115252BBF1363B7231ED32309C9E2E5B6EEEC1B2BBC2700A49A26E56D0
                                                                                                                                                                                                                                                    SHA-512:C455DE6466A9FA535C685163A6B4540DC00EB51CC5565ADDFB0E124E3A29CD4AFEC7AB9DF7848C9D3A6C7F435E1CC761F74D8F162D8BC7378D086E96EFA2E705
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........%&(.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.(...y.....z.=...|.C...}.U.....].....b.....j.....r.....z...........................................................R.....y.....W...........C.....>...................................X.................C.......................O.................k...........J.....j.....9...........X.......................(.....b.....4...........s...........u.....1.......................z...........0.....d.....\...... ....I ..... .....!.....!....!".....".....#.....#.....#.....$....<%....|%.....%.....&....m'.....'.....(.....(.....).....)...."*.....*.....+....1,....X,.....-.....-....'.....N....../...../....#0....D0....O1....W2.....2....%3.....3.....4....!5....V5.....5.....6.....6.....6.....7....(8.....8.....8.....9....Y:.....:....-;.....;....|<.....<.....<.....=....l>.....>.....>.....?.....@....!A....PA....zB.....C....KD.....D.....E....lF.....F....&G....6H....2I.....I.....I.....J....iK.....K.....K.....L.....M....zN
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):459985
                                                                                                                                                                                                                                                    Entropy (8bit):5.5152848417450615
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:HAeAGZgSZ+XKFELrqmjLCd3MP9ej7HXfaYISMv5n5CSEBcWRnFc:HjfZgseoEL5C3Ma7H6N5CSgc
                                                                                                                                                                                                                                                    MD5:F8EEEBF6B363D8578D769AA05FED5BA7
                                                                                                                                                                                                                                                    SHA1:12E8B6FE48CA49936769B766A9A13510D9569A20
                                                                                                                                                                                                                                                    SHA-256:1F7D3BEACD2A55F3BF2D3571BEF1D05FA333FADD9E6CA141C2525B0678824CDD
                                                                                                                                                                                                                                                    SHA-512:3AAE1B6881E50E88635336218D7C13ACF81687AD78FB902900746EB875D9DD29DBF83A1D51344DF617DD86E31BAAD04564460ECC48886308E742830412E8C71D
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&..e.`...h.d...i.r...j.~...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.-.....5.....:.....B.....J.....R.....Y.....`.....g.....h.....i.....n.....{.............................~.......................|.................$.....}.................(.....t.......................J.....s.......................5.....B.............................v.......................l.......................H.............................^.......................^.......................*.....E.....T.............................8.....u.......................J.....|.................&.....S....._.......................!.....i.......................).....n.......................[.......................:.....].....s.............................{.......................J.......................1.....h.......................;.....j.....z.................W.....o...........B.......................X.......................N.....z.......................4.....D..................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):464664
                                                                                                                                                                                                                                                    Entropy (8bit):5.505055040425703
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:V0BSJCCPeiISZuw3jcMP9eD3D9faYLbcNx5FSZngP/eXywB:8SJDPeDIjcMY3DzA5FSHywB
                                                                                                                                                                                                                                                    MD5:4B6300C27E7575C32888C1F3364D5346
                                                                                                                                                                                                                                                    SHA1:C5F5E1D3524ACC96FB4E18C08B02F54ABF83C3D4
                                                                                                                                                                                                                                                    SHA-256:0945C89B16D4FEBA346E85E14792B772DCC6278F7DCA7FB099A6100C93E79740
                                                                                                                                                                                                                                                    SHA-512:3F21B6F4A3E18755B355CE5F20384D549B3F723104A67C67AE521D2C4544AA3095FADA8855A0CC1A10E7C5BF3E8F55D061AB2DCEC210F76101A61D9484D4EE6F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&..e.....h.....i.....j.....k.....l.....n.....o.....p.&...q.,...r.8...s.I...t.R...v.g...w.t...y.z...z.....|.....}.............................................................................................................;.....N.................".....2.................-.....C.......................+.....w.......................<.............................E.....j.................4.....i.................".....S.....a.................#.....3.............................i.......................\.............................6.....U....._.............................e.......................F.............................V.............................>.....I.............................l.......................g.......................).....e.......................+.....M.....\.................5.....[.............................Z.......................?.......................;.......................`.......................a.......................+.....i.......................C ....t
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1031027
                                                                                                                                                                                                                                                    Entropy (8bit):5.210875521790238
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24576:HmdiMRfFgJWHLboEFFRyYHiLNQTCvXTOnXv1x7S6a8wGi4ADjn1VtuYtP01+Z5zp:H/sm5z9v
                                                                                                                                                                                                                                                    MD5:D5A14353A7FCC1F199F9234BD4551FF9
                                                                                                                                                                                                                                                    SHA1:7476E2846B6C0D03338A074D7FE325BB468992FE
                                                                                                                                                                                                                                                    SHA-256:E5CFEBD81831A65CA268866A8EEADB334F64FA3B0853BD550E5BB69724408FBC
                                                                                                                                                                                                                                                    SHA-512:BCE4FB535509834EA32ACBA72FC22B76CE591F9B6C1C15207B023460F59E9BC6F65118F816A82D235E7F20E26BF822EA102C95B5DA71FCFF099D56215945BD27
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&g.e.....h.....i.....j.*...k.9...l.D...n.L...o.Q...p.^...q.d...r.p...s.....t.....v.....w.....y.....z.....|.....}.........................................................................8.....[.............................k...........t.....=.............................f.................J.......................t.......................a.......................g.............................]...........i.............................P.......................q........................ ..... ..... .....!....."....O"....y".....#.....#.....$..../$.....$.....%.....%.....%.....&.....'.....(....[(....%).....)....a*.....*....C+.....,....s,.....,....R-..........~...........X/.....0....~0.....0.....1....x2.....3....M3.....4.....4.....5....J5.....6.....6.....7....J7.....8.....8....!9....K9....2:.....:....q;.....;....z<.....=....L=....r=....U>.....?....|?.....?.....@....EA.....A.....B....,C....8D.....D...."E....!F.....F....zG.....G.....H....dI.....I.....I.....J....RK.....K.....K.....L.....M.....N
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):560321
                                                                                                                                                                                                                                                    Entropy (8bit):5.366866302767652
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:jjxzJ7FnfONzx0T8puYnKwoR5g6qLFYUudBm+u:nP8/pQj5g64F4Tu
                                                                                                                                                                                                                                                    MD5:AAB525A7681AE93791B283205064E2B4
                                                                                                                                                                                                                                                    SHA1:A021DBDCD3F269B77D7133F47B63906FFF794F76
                                                                                                                                                                                                                                                    SHA-256:5EF4BB4558102F2E39669208BECE79FD5B474E0A87C8A1EED5BCD6B13DA6C6FA
                                                                                                                                                                                                                                                    SHA-512:841CD903FCF716692FF1873EDAC4FEB5F8B907AFEC1D0DEBFABB39255A74B9B2096FAE3E562E95893DAC731EF46D07B12B6A441975042981CC88638B7673B435
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........+&".e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.*...w.7...y.=...z.L...|.R...}.d.....l.....q.....y.........................................................................................v.................i.................Z...........7.....U...........B.......................B.....l.................<.....d.....u...........o.................n...........".....L...........).....n.................V.................)...................................j.................(.....W.....r.................K.....Z.................R.....h...........E.......................a.......................W.......................<.....l.....v...........D.........................................Y.......................c.................J.......................r...........) ....j ..... .....!....?!....Y!.....!....."....O"....h"....."....5#.....#.....#....*$.....$.....%....(%.....%.....&....z&.....&....#'.....'.....'.....'....5(.....(.....(.....(....7).....).....).....*
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):559178
                                                                                                                                                                                                                                                    Entropy (8bit):5.34611084339133
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:tMTZMKZuHswv12Jp/bNg86ip3+UxojFtnj45vzr700Iu96PZrk8jb:AZMKUGVVLpzojTnj45brY0sb
                                                                                                                                                                                                                                                    MD5:078BD56804D26C26E9AA4F41BF6549F6
                                                                                                                                                                                                                                                    SHA1:B1B575D34769F35CF28158BCB40C92264DECC551
                                                                                                                                                                                                                                                    SHA-256:99389110A1497D3999E8CB5799A629A471D221E07C2818CEFEEDB1C95BF5A9F3
                                                                                                                                                                                                                                                    SHA-512:4108B3BDED940A7D3939EE68DD489A4453391BAE548285867B81A50217C248280111853A1EB6838B6C079A01A74D11CEE61E7F441CBC6D7BA91F1DFAE3EE602F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........2&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t."...v.7...w.D...y.J...z.Y...|._...}.q.....y.....~.........................................................................................+.........................................v...........f.................c.......................u.......................v.................7...................................V.....t...........L.......................p.................@.............................#.....q.................K.....~.................@.....h.....w...........:.....p.................R.......................M.......................:.....k.....v.................N.....X.................E.....U...........C.......................Z.......................T.....{...................................A.................1 ..... ..... .....!.....!.....!.....!....."....."....."....."....>#....X#.....#....l$.....$.....$....o%.....%....:&....c&.....&....F'.....'.....'.....'....@(....f(....y(.....(....J).....)
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):509452
                                                                                                                                                                                                                                                    Entropy (8bit):5.455817407928288
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:Z0izVKnUJ1HNRSUSx+DuM/Fb0WmFosQ4Eqsoh7Pwiw4dQH5ejnrlvCKMvaKWcEzn:vVKi7S65JmFosZtQH5ejJsW
                                                                                                                                                                                                                                                    MD5:45E28E64378FABED845EB242A8F1563D
                                                                                                                                                                                                                                                    SHA1:8FAA0651CA0D29596CA294DC448CB870D553C0FF
                                                                                                                                                                                                                                                    SHA-256:68386C75B1E414B5F94E1AA5EB9A98A42B6298177FABB834A8B9E96E1EF70A2D
                                                                                                                                                                                                                                                    SHA-512:3165EC45C2958C382832E4528D38966C28CA90C84777FD48D762FBD75F31FD52BD1B2C069BA4644504913219FAD5DDC08980F69DC67B9AB03D392AFC1321C339
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........:&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.!...s.2...t.;...v.P...w.]...y.c...z.r...|.x...}...............................................................................................................................t.................&.......................I.......................I.......................;.......................=.......................M.......................w.......................{.................'.................).....A...........6.....{.................W.....y.................=.....`.....l...........!.....K.....[...........).....c.....n...........5.....o.....}...........6.....g.....o.........../.....b.....q...........0.....d.....l...........T.......................U.....t.................H.....l.................<.....t.................I.....}.................L.....f.....w...........;.....c.....{...........G ..... ..... .....!.....!.....!.....!.....".....#....I#....n#.....#....J$.....$.....$.....$....-%....I%....]%.....%....+&....Y&
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):825360
                                                                                                                                                                                                                                                    Entropy (8bit):5.0557125829631335
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24576:FqvG8u313uyqoT+s1qLpRmX1loT4RmdAQifaQ2XxFMJGk620dri1HMX9O9xdpxHk:Evpu55M
                                                                                                                                                                                                                                                    MD5:A13029CB1D5873121E6BDD0929A6C772
                                                                                                                                                                                                                                                    SHA1:7B88AE77DF959B8C01F5F00F2B0DFC30ED0A85EA
                                                                                                                                                                                                                                                    SHA-256:2527D1821D08E43D2F1259A1F910AF986632B8AEF9257D2FC37BC285AF7EE217
                                                                                                                                                                                                                                                    SHA-512:AF272D021316A71CF2A98126AF9CA993122B3B7B766C6D34003BCDC2FC5936BC4FAE95293B1D74FE35A0C81150D45E95ADABC4B34118974D214049FCDBEE74CA
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%p.e.....h.....i.....j.....k.*...l.5...n.=...o.B...p.O...q.U...r.a...s.r...t.{...v.....w.....y.....z.....|.....}...................................................................%.....A.....k...........w.....H.......................M.......................]...............................................K.................=...........#.....D...........}.......................O.................Y...........E.....a.................................................................*.....N...........W.................,.............................!.....c.....z...................................@ ..... ..... .....!.....!.....!.....!.....".....#....R#....t#.....$.....$.....$.....$.....%....I&.....&.....&....L'.....'.....'....!(.....(....h).....).....)....}*.....+....j+.....+....>,.....,..../-....u-.....-....k.................e/.....0....a0.....0....&1.....1.....2....%2....#3.....4.....4.....4.....5....N6.....6.....6.....7....98.....8.....8....39.....9.....9.....9.....:....G;.....;.....;
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):517467
                                                                                                                                                                                                                                                    Entropy (8bit):5.424845538875905
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:RKUtqd19KJOKu4ar5HZ7kfCHEpyWaZ7WYM:Ntq8S5HFHAl
                                                                                                                                                                                                                                                    MD5:E7B72F44D711DECE8E3043173A553AC4
                                                                                                                                                                                                                                                    SHA1:892424E4E011AAC47B068F9FD929B5E41BCCA525
                                                                                                                                                                                                                                                    SHA-256:5F1A9DF87400AF56F748026F3BAAA41756A4C42FCE4791AABFE2087441689340
                                                                                                                                                                                                                                                    SHA-512:A2907B8E12CCDD0FC5601C37F23CCD5556B4EAE18CB1833481D01B39B30EC643167B0C8295EC9EE8CE851B0C7968E83F9C47C6E1D4543A371A62485D1832835A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%..e.....h.....i.....j.....k.....l.....n.#...o.(...p.5...q.;...r.G...s.X...t.a...v.v...w.....y.....z.....|.....}.....................................................................................'.....@...........E.......................s.................(.......................O.......................Y.......................7.............................\.........................................9.......................5.......................8.......................X.................&.............................[.......................!.....k.......................;.....e.....o.................N.....[.................#...................................l.......................a.................0.....~.......................K.......................A.......................?.......................I.............................f.......................^.................7.................................... ....2 ..... ..... .....!.....!....p!.....!.....!.....!....7"....."....."
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):584976
                                                                                                                                                                                                                                                    Entropy (8bit):5.195604084490558
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:4ln56kcajNxYUC36tIQy7DQEuq2V8L0dnGNLmG5eXmi1YARFtK:KnAkcmqnxEG5omt
                                                                                                                                                                                                                                                    MD5:F7F3CC17509AF03E639E983A091C2026
                                                                                                                                                                                                                                                    SHA1:D36E61E50B5FA99BE2A3C3727AFEB142969C8308
                                                                                                                                                                                                                                                    SHA-256:5D586C9BFA38452CDFB50BF5D2E9B98E68A8E7CC73E4D641D8FD6BB3E7EC5712
                                                                                                                                                                                                                                                    SHA-512:5A2C037D0AFDC82A4ECA642F43CC10E0040B7F97BE9DA14A8F806970C1E07BEC9CD69AD816A91A41946F35FF7A760ACC65DF21F6CD9D365ACBBA345FF0C1FF70
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v./...w.<...y.B...z.Q...|.W...}.i.....q.....v.....~...................................................................................-.................(.............................4.................5.......................h.......................u.................+...........+.....i...........+.................#.................[.....q...........[.................1.............................5.......................s.......................i.......................R.....|.................h.........................................&.......................(.......................).......................M........... .....=................./.....M.................. ....! ..... ..... .....!....2!.....!....'"....n".....".....#....l#.....#.....#....&$.....$.....$.....$....j%.....%.....&....A&.....&....u'.....'.....'.....(.....)....S).....).....)....d*.....*.....*.....+....j+.....+.....+....",.....,.....,
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):606342
                                                                                                                                                                                                                                                    Entropy (8bit):5.380118288987104
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:n2sEZLqUMDpDgEL6QuaMVWXKz05qlZQmZyMYnYtkL09ujzxRe5hxkJSW7v40wCJ/:zj2VIN5JL
                                                                                                                                                                                                                                                    MD5:326917C8F37FE85E58AD3DE991D17A78
                                                                                                                                                                                                                                                    SHA1:683ED0FB95F33DC2B095E774AD3DE84B0E4A63E3
                                                                                                                                                                                                                                                    SHA-256:CFA45E5F86F70AE4D47D82BCEC6C245E618212E67CE8B7BF0A1BE0BE41C6E6E8
                                                                                                                                                                                                                                                    SHA-512:3FDF2B1C8031A06D5140449E22861545CC80E1417A70558DB2ACAC25733AC156A0D7941B053A7CFFB2ED193BBE5E0CAE4F1F68437FA570C612BE606DD10ECAE1
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&<.e.h...h.l...i.}...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z. ...|.&...}.8.....@.....E.....M.....U.....].....d.....k.....r.....s.....t.....v.............................Z...........z...................................k...........P.....l...........G.......................x.........................................c.................>...........).....l.................n.................&.......................\.................-...........Q................./.......................0.......................*.......................B.......................[.......................^.......................K.......................D.......................o...........S.....j...........0.....^.....|.................4.....R.................X.....t...... ..... ..... .....!....[!.....!.....!.....!....[".....".....#....!#.....#.....$....Z$....z$.....$....x%.....%.....%....f&.....&.....'....>'.....'....I(.....(.....(.....)....^).....).....).....*.....*.....*
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1177779
                                                                                                                                                                                                                                                    Entropy (8bit):4.338116428198543
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3072:C3T12vbLPxCoYITYsRvc38ZUd02GHIwjAwREJKVMjNiT7llj63rhJXlPCKMi5eWt:dTbYITncQi02JCWJL5DAhc2T2
                                                                                                                                                                                                                                                    MD5:D77AEE1AB6AF4FC83813A69D3CA61E46
                                                                                                                                                                                                                                                    SHA1:C0786021AF8C8BBB083E9C4104B68BD28537893A
                                                                                                                                                                                                                                                    SHA-256:5D5E20C5F0CA21D8F1824EEBE8E595FAD4D0E601B224F4433B355A21B643971F
                                                                                                                                                                                                                                                    SHA-512:78C2589BC37594236D5B01C4C6C0CB934CF9CCAE15679159E1BCE64E3F5A3C903F9F7127D0DA8C317FD085A70EDFFDCAC413B4F2627BF14B862794B47BBA042A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........+&".e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.&...v.;...w.H...y.N...z.]...|.c...}.u.....}.............................................................................(.....`.................j.................Z.................F.....).............................#.....L...................................=.......................U...............................................|.............................E.....q.....n.....i...........+.....N.....\ .....!....D!.....!....n".....".....".....#....H$.....$.....$....O%.....%....?&....X&....$'.....'....=(....h(....$).....)....?*....a*.....+.....+.....,....),.....,....}-.....-.....-..........S/...../...../.....0.....1.....2.....2.....3....74.....4.....4....;5.....5.....5.....6.....6.....7....08....V8....a9....,:.....:.....;.....;....s<.....<.....<.....=.....>.....>....)?....)@.....@....mA.....A.....B.....C.....D.....D.....E.....F....vG.....G.....H.....I.....I....*J.....J.....K.....L....4L....SM....0N.....N
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):728589
                                                                                                                                                                                                                                                    Entropy (8bit):4.658856122190603
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:W5SDjhr3FluYMy31frspm29Wqu/kQl4JACVXbfeQCajLn5l67co+oiNB05elmmdi:W5SdY5/oP
                                                                                                                                                                                                                                                    MD5:04C846A7F65C1E95E49CFE69EC9EEB45
                                                                                                                                                                                                                                                    SHA1:78142FD5545EE76B1F90FF5DF6FB7C01D797F3D1
                                                                                                                                                                                                                                                    SHA-256:AFAFB0DADD253E7F665FCB0D9D562D243E32D774B6ABDF602B66734F310E689B
                                                                                                                                                                                                                                                    SHA-512:029F45EE02DAD7D3431B223F5516937E34D685026488BA2DBF7C43FFDEDD1240FA119C349E4F5052CA3FDE109215D6D8813A43297A7E4EDB5D9B063192AC775A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%N.e.D...h.H...i.Y...j.e...k.t...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.............!.....).....1.....9.....@.....G.....N.....O.....P.....R.....i.......................}.....3.................g...........%.....>.........................................a.................x.................E...................................=.....m.........................................s...................................q...........8.....Q.......................E...........+.....V.................m.................I...........!.....8...........*.....j.....}...........s.................B.......................s........... .....3.................\.....o...... ..... ..... .....!.....!.....!....."....?".....".....#....>#....b#.....#....Y$.....$.....$....g%.....%...."&...._&.....&....''....H'....a'.....'....D(....u(.....(....4).....).....).....*.....*.....+.... ,....D,.....,....l-.....-.....-.........../....b/...../.....0....u0.....0.....0....~1.....2....k2
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1250127
                                                                                                                                                                                                                                                    Entropy (8bit):4.3103395858193565
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3072:AubcffOrA0yUdRSM7vyWYfbXpgTMoV/BB0ZV1d1AuxXRLiW3Jk1eTByntDPtDl+U:AuAf2E0yjUv3MlgTMJem05f5xhbv
                                                                                                                                                                                                                                                    MD5:114BBD0D21C90DDFCE1D6E26432B7B9C
                                                                                                                                                                                                                                                    SHA1:EBFC476B4D742D9FDF5D0E78996748497EB0B4FF
                                                                                                                                                                                                                                                    SHA-256:E2321752811548A92EF069E53ABE349CAA93BE5596A2579DDE65391EE7CF915B
                                                                                                                                                                                                                                                    SHA-512:6195FC185F8297CA1C38B79339F86F0788B342A90B0E98F1ED5883CBE61725000B1653E911EB749351BB74802B8E75199DCF0C95D903A4422755E809A6A1814D
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%_.e."...h.&...i.7...j.C...k.R...l.]...n.e...o.j...p.w...q.}...r.....s.....t.....v.....w.....y.....z.....|.....}...........................................%.....,.....-...........0.....R.....w.....................................................g.............................8.....+.............................6.................~...........y.................+.............................8...........^..... .......................W.......................................... ..... .....!.....!....."....y#.....#.....#.....$....b%.....%.....%....s&.....'....M'....f'....=(.....(....b).....)....R*.....+....d+.....+....3,.....,....3-....O-.....-................./...../.....0.....0.....0.....2.....2.....3.....3....x4....#5....p5.....5....76.....6.....6.....7.....7....n8.....8.....9.....:.....:....A;.....;....O<.....<.....=....]=....Q>....-?.....?.....?.....@.....A....BB....zB.....C.....E.....E....+F....9G.....H.....H.....H.....J.....J....~K.....K.....L.....M.....M....:N....7O.....P.....P
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):562949
                                                                                                                                                                                                                                                    Entropy (8bit):5.503469092776888
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3072:5pEDgLd6TlZ/9yZuYUapEXgaBV08L7SkK7D+wwWrDfB+uhAxqOSAq6+xMcwd0uPJ:HEDjTMzU0EV7xHwPBhbKBc5ag7yIjR/K
                                                                                                                                                                                                                                                    MD5:54308E58D399D0F1C4E66A4A4B6E3B59
                                                                                                                                                                                                                                                    SHA1:8DFCE74D45801654531C78E34CF6A6C2E4BA5556
                                                                                                                                                                                                                                                    SHA-256:8141D126CD8ED7CD29B998E4A778E81AEC043BC126B5D2B0FB62F95C5FBF1F62
                                                                                                                                                                                                                                                    SHA-512:33C74ACE0F430D2E7963512075007DCA70ADCDD43FCE31A27F925351CEB00CFECE329EC5E9B60DACFF7E28DA322FC9CEFF3FCD9AE3A7BB6655400F1A580C3EA2
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........F&..e.....h.....i.....j.....k.....l.....n.....o.....p.'...q.-...r.9...s.J...t.S...v.h...w.u...y.{...z.....|.....}.......................................................................................................C.................0.......................c...........#.....B.................R.....h...........".....T.....d.................2.....B.................G.....l...........i.................D.......................k...................................L.....g.............................e.......................C.............................U.....v.................I.......................D.....r.................L.......................A.....l.....|...........'.....T.....d...........T.......................Z.....|.................@....._.................(.....U.....l...........K.......................m.................. ....u ..... ..... ....G!.....!.....!.....".....".....#....t#.....#.....$....n$.....$.....$....9%.....%.....%.....%....'&....p&.....&.....&.....'....|'.....'
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):605952
                                                                                                                                                                                                                                                    Entropy (8bit):5.638270541961174
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:n0L6iTfLsgtbgq0LcP9wHs8DfcAujkatvV5RvBFZfpduYG3b7ZNIeHK9njDi59Rj:iTfrtcFQA0V5RvBn0zzKY5u0vv
                                                                                                                                                                                                                                                    MD5:B7AA52653BBABCC713A03067E6FCFCC3
                                                                                                                                                                                                                                                    SHA1:B18CC0B968C4C0F156E33F5C493E6C09760161DD
                                                                                                                                                                                                                                                    SHA-256:244BE241E2FD68882ADB0C1A1C4AE93B1406AE22CCC14BCB37FC09FE3C2831A5
                                                                                                                                                                                                                                                    SHA-512:CB393247F79F1A6CDD685AD9729D0C7FD3BFADB5591CD822A4F92BA19448E50C148517DC0DDC14C37243CC0145A5AB17D27C45CCEBDCCB76CEC70C1B444D07C0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&L.e.H...h.L...i.]...j.g...k.v...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.............#.....+.....3.....;.....B.....I.....P.....Q.....R.....W.....g.....}.................T...........u...................................f...........L.....f...........^.........................................(.......................{...........-.....^.............................s...........(.....:...........!.....c.....s...........v.................k...........W.....v...........j.........................................).......................q...........M.....d...........n.................>.................+.................W.....l...........r.................C...........(.....>..........." ....I ....e ..... ....0!....\!.....!.....!....L"....."....."....4#.....#.....#....&$.....$.....$.....$.....%.....%.....%.....&.....&.....&.....'....c'.....'.....(.....(....%)....4).....)....[*.....*.....*....s+.....+....:,....V,.....,....$-....U-....q-.....-....b.......
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):500354
                                                                                                                                                                                                                                                    Entropy (8bit):5.374540321275158
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:HDTG/Veh932Bmcwf/yG+wFZf+MVnjHF3mmi8IxZ5GZhWwkK5cTSzo7IEji4JHw:HHG8h94sXyMFTVnjHFWmNIb5GZhow
                                                                                                                                                                                                                                                    MD5:0EFA0011CE0365AE4AFC08753F559098
                                                                                                                                                                                                                                                    SHA1:6AFC5115DFC222F0F2B2265A591B571803787DCA
                                                                                                                                                                                                                                                    SHA-256:A780C4E8E48CBDF2064CFF3E9E025103739B3763E3B82DDD99C97DFFF8FB1CE2
                                                                                                                                                                                                                                                    SHA-512:21C34901F5260606F14FE0E004851AF4DFA6960C28872417FB995ADAC4B2652609D9C0F5F30C0F76F4287217ADCDC0ACF1545CBD4E5A6F4B15565668840BCB75
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&3.e.z...h.~...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.#...z.2...|.8...}.J.....R.....W....._.....g.....o.....v.....}.....................................................@.......................`.......................Q.......................m.......................p.......................N.......................8.......................@.......................4............................._......................._.................!.......................(.....e.......................$.....I.....U.......................!.....|.......................c.......................>.............................e.......................L.....~.................?.....u.......................(.....9.............................b.......................C.......................'.....c.....}.................=.....k.....z...........6.....r...................................Y.......................l.......................B ..... ..... ..... .....!....q!.....!
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):558299
                                                                                                                                                                                                                                                    Entropy (8bit):5.272942823509238
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:qrF11tFO6w7oWhI7xO2/IJ/jNLiISIqRRRsO1StiRT9TjexKqcQxLcaPpzHi9fLN:u1tFFehoXFZxR8g26sjoh59koF
                                                                                                                                                                                                                                                    MD5:12FFE0FC0BE1B4134F219BD3B6D8F550
                                                                                                                                                                                                                                                    SHA1:DC14159AEA6643FEED260C3E3EB9BF4286FFFD9C
                                                                                                                                                                                                                                                    SHA-256:4FFAADC42BB0F78B78061EEC23B39BEBF34BA3B9B4F2CD0415FD3C94B2C828D3
                                                                                                                                                                                                                                                    SHA-512:423EB3AA074617C8FB64EA909CF860C8706B73B5CBC97D85D21E9298DC53CF9451DECCB1DE45B19377E8E2461D78282D587264340BCE8F487AD48B0DDEE55123
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........)&$.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.;...y.A...z.P...|.V...}.h.....p.....u.....}.........................................................................................w.................X.................2.................'.................g.................(.....O.....].................$.....3.................L.....v...........n.................X.......................y.................".................?.....X...........R.................'.....s.......................W....................... .....G.....R.................\.....n.................J.....U................. .....).....x.......................Q.......................Z.................,.............................U.............................d.................(.......................c.......................>.....|.................J ..... ..... .....!.....!..../"....."....."....<#.....#.....#.....$.....$.....%....W%....m%.....%.....%.....&..../&.....&.....&....:'
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):677279
                                                                                                                                                                                                                                                    Entropy (8bit):5.7261443457831875
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:5mNTLdjIcq5eHWv0WSGRBZ6Q2T+NbX5+Fo1Vi:5mNTxqe2ccBZ6Q2T+h5+FF
                                                                                                                                                                                                                                                    MD5:A92DA679A63FB99BB5F3BCF829168D21
                                                                                                                                                                                                                                                    SHA1:F15AA9BA6A952490DD881C82DED179FE03E50E80
                                                                                                                                                                                                                                                    SHA-256:F78FEB7523A3B4C795AC02EB66FD455B0F490257549D681B7AA07255E99AB9D9
                                                                                                                                                                                                                                                    SHA-512:3055528033206B6F32371A1BA05633614C0A3A9AF4FE2326FA3E6689BF535D5D540D926E08963FB668B02EEFF216DC2ECABED035C821C83E5D96CD2ED1531835
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........e%..e.....h.....i.....j.(...k.9...l.B...m.J...o._...p.l...q.r...v.~...w.....y.....z.....|.....}.....................................................................................1.....O.....p...........+.................'.................Z.....r...................................|.............................9.....K.................F.....V...........R.................@.................%.................8.....H...........#.....T.....c...........D.....{...........3...........5.....P.................6.....R...........S.................A.................*...........d.................`...........2.....A...........=.......................}.................P.................1...........j.................j............ ....: ..... .....!....Q!....r!.....!....^"....."....."....f#.....#....*$....d$.....$.....%....>%....M%.....%....R&.....&.....&....''.....'.....'.....'....z(.....).....).....).....*.....*.....*.....+.....+....1,....w,.....,.....-.....-.....-.....-....k...........4/....O/
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1341496
                                                                                                                                                                                                                                                    Entropy (8bit):4.250874916501427
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:F13C1631BB1E180C07CB10C5142CEC74
                                                                                                                                                                                                                                                    SHA1:BD3B971893D3CE2206EDD040ED0EAB9BA010BD18
                                                                                                                                                                                                                                                    SHA-256:3A63D9B5BDECE8442ACA6971771A660BCEAE995CA96394FA88B024FEF3C93BF7
                                                                                                                                                                                                                                                    SHA-512:9122A55CE0E09ADAFE0162337B518228441D9A852E68761BFB62B656415F25386B3DB41279699F8035BE3BB3EA003FCBA91B5D5FC6EC538EF79E9486A488280A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........M&..e.....h.....i.....j.....k.....l.....n.#...o.(...p.5...q.;...r.G...s.X...t.a...v.v...w.....y.....z.....|.....}.........................................................................(....._.................j.......................A.....I...........X.........................................]...........Y...........P...........q.....:.............................q...........2.....A...........y...........S...........".....1 .....!.....!.....!....)#....?$.....%....Q%.....&.....'.....(....@).....)....r*.....*.....*.....+....@,.....,.....,....U-.....-....>.....S.....6/...../....w0.....0.....1....?2.....2.....2.....3....B4.....4.....4.....5....p6.....6.....7.....7.....8.....9....@9....b:....a;....!<....P<....3=.....=....Q>.....>....>?.....?.....@....,@.....A.....A.....B....`B.....C....PD.....D....eE....MF.....F....RG.....G.....H.....I....'J....yJ.....K.....L....TM.....M....(O.....P.....Q.....Q....8S....6T.....T....lU.....V.....W..../X....|X....IY.....Y....\Z.....Z.....[.....\....]]
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):569413
                                                                                                                                                                                                                                                    Entropy (8bit):6.084713993678112
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:E8448C3D352C76C1C0F2B9F508852D9A
                                                                                                                                                                                                                                                    SHA1:2B7FE9F0A49FE3428E467A4214D0E7EC79CF7B52
                                                                                                                                                                                                                                                    SHA-256:30D515F2E086A7773DD3C7B5E6504729B6D91D9FA7174C3226EB3553F900BBF2
                                                                                                                                                                                                                                                    SHA-512:AE4144323E7EB2C2C97F336EE144C0C739CB5500F7FF382469CB4CE33DBAE35078EACD85F50381912C9D4367DFC9CBCB6C7C7BCE8314A0351B14F950A2209184
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........>%..e.....h.....i.....j.....k.....l.....m.....o.....p.....q.....r.....s./...t.8...y.M...z.\...|.b...}.t.....|.....................................................................................................A....._...........8.....y.................p.................3.......................Q.......................V.......................e.......................v.................+.......................!...............................................+.................{.................D.....h.................%.....J.....Z.................%.....5.................W.....s...........7.....k.....{...........B.....v.................E.....u.................C.....t.................y.................:.......................*.......................5.......................O.................#.....t.......................?.......................B.......................U............ ....& ..... ..... ....0!....G!.....!....."....>"....Q".....".....#....$#....7#.....#.....#....($....;$.....$
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):611429
                                                                                                                                                                                                                                                    Entropy (8bit):5.6299671018290445
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:F6F5B593C91B7820C9552FFDDFAC03FC
                                                                                                                                                                                                                                                    SHA1:D771AC14A49C7654043D0AE2DC52239BF4636F65
                                                                                                                                                                                                                                                    SHA-256:FFE7EAC4BC39085977C28BF8BA0060B9A12471C3914A30DF1C46305926242BB6
                                                                                                                                                                                                                                                    SHA-512:45D3580D456F6972259055BFFEDE8745C922DFE2703BCF3A545E73211164E3CA594A56330A2A17EC373AB060C05A7776D88DFBAB5014081948A5F89A849F793C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........&&'.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.(...w.5...y.;...z.J...|.P...}.b.....j.....o.....w.............................................................................v...........d...............................................i.................z.................D...................................?.....V...........P.................3...................................D.....U...........C.....}........... .............................&.....t.................t.................#.......................N...................................E.....X...........L........................................._.................(.................C.....Q.............................h............ ....( ..... ....9!....s!.....!....."....."....."....."....m#.....#....*$....]$.....$....4%....V%....i%.....&.....&.....&.....&.....'.....(....J(....n(.....).....).....*....!*.....*....*+....h+.....+....&,.....,.....,.....-....j-.....-.....-................./....Z/
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):610750
                                                                                                                                                                                                                                                    Entropy (8bit):5.626685122127425
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8D8244CEA7D00E7502CFC62908147BB7
                                                                                                                                                                                                                                                    SHA1:2ECF5C264208555EC5BD4530544CC0AEE99F558F
                                                                                                                                                                                                                                                    SHA-256:C9722A6B132E9EF5BCA53565BCBC2CB3C40CB8954F2286250AD15FAFC0D2DCC1
                                                                                                                                                                                                                                                    SHA-512:B5B98ADE8D7EA25477D12CBEB6B1F07FEC5625583B8CC695755195B1EEF0D380C72AE4609955D230B4FD6109AA6B778421E7EAE9D7086FEC03CFF93C93D91791
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........J&..e.....h.....i.....j.....k.....l.....n.....o."...p./...q.5...r.A...s.R...t.[...v.p...w.}...y.....z.....|.....}.....................................................................................$.....@....................... .................T.....g.........................................Y.....x...........W.........................................O................. ...........e.................H.............................&....._.....r...................................*.....z.................f.......................o.......................}.................5.................$.................:.....L...........:.....q.................i...............................................#.....u.................P ....k ..... ..... .....!.....!.....!....5"....."....."....."....j#.....#....:$....t$.....$....A%....a%....z%.....%....~&.....&.....&....J'.....'.....(....%(.....(....|).....).....)....z*.....*....5+....[+.....+....V,.....,.....,.....-....r-.....-.....-....4............/
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1394062
                                                                                                                                                                                                                                                    Entropy (8bit):4.285571867304228
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:979090995F7F9DBFA9FA9A96349DA745
                                                                                                                                                                                                                                                    SHA1:6D9425EB6D3FF6B433A2FFD89DFFB3AEDCDE3588
                                                                                                                                                                                                                                                    SHA-256:C27AC1727F3A3A25ABED09CBF07DA604DD1C42A1855851E63DFCDC9831091EDD
                                                                                                                                                                                                                                                    SHA-512:4D734D7903DD4C39A2392EDA7B6A65929E61FE105ED843718D5CAF8D93DA9FF14A8908B896425335FCE9CA5AE717C29C80E7D85A2A6B80DF9F4FAC8F7A558F38
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........G&..e.....h.....i.....j.....k.....l.....n.....o.....p.)...q./...r.;...s.L...t.U...v.j...w.w...y.}...z.....|.....}...............................................................................b.................T...............................................c.................................................................\.....M...................................8............................................................ .....!....s".....".....#.....%.....%.....&.....'.....(.....)....2*.....*.....+.....+.....,.....,.....-....".....P....../...../....40....h0....J1.....2.....2.....2.....3....I4.....4.....4.....5.....6....#7....W7....C8.....9.....9.....9.....:....i;.....;.....<.....=....?>.....?....C?....-@.....@...._A.....A....\B.....C....PC.....C....nD....;E.....E.....F....BG....*H.....H....HI....,J.....J....TK.....K.....L.....M....NN.....N.....O.....P....IQ.....Q.....R.....S.....T.....T....&V....-W.....W....=X....kY....fZ.....[....Y[....J\...."].....].....]....+_....:`.....a
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1147816
                                                                                                                                                                                                                                                    Entropy (8bit):4.319695697825778
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:7862ABEC5008FAC0A8924B65B3058C05
                                                                                                                                                                                                                                                    SHA1:BC6A3F405835E3F3290CB521CA2A9AC85EAECDC4
                                                                                                                                                                                                                                                    SHA-256:44056C45DE472FF1A5037FC24CC2417218CF4FA500B6A7158BD8AA221268B69F
                                                                                                                                                                                                                                                    SHA-512:C91A1DCC08EAECF7F99B37684E02F3F89D18DBAF24B2BF3849CE78965A38E8A995ABBA03C0F8F20420AA15519439F0C662165BAA6A31BFE3CF994AA51F67C8F8
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%O.e.B...h.F...i.`...j.l...k.{...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......#.....(.....0.....8.....@.....G.....N.....U.....V.....W.....\.....~.......................c...........Y...................................$.....Q.....'.....x.....~.....{...........4.................".....d.....0...........d.................l...........&.............................%.....(........................ ..... ..... ....."....3#.....#.....$.....%.....&.....'.....'.....(.....).....*....E*.....+.....+.....+....),.....,.....-.....-.....-.........../.....0....f0....N1....$2.....2.....2.....3....G4.....4.....4.....5....G6.....6.....6.....7....Z8.....8.....8....$:....M;.....<....N<.....=.....=.....>..../>.....>....t?.....?.....?.....@....^A.....A.....A....&C....!D.....D....7E....!F.....F....?G.....G.....H.....I....=J....~J.....K.....L....@M....sM.....N....#P.....Q....3Q.....R.....S....1T.....T.....U.....V.....W..../W.....X.....X....)Y....RY....sZ....g[.....[
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):524044
                                                                                                                                                                                                                                                    Entropy (8bit):5.251286724342732
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:5EE8AEFF66C42600D73F9CB7D8366CCE
                                                                                                                                                                                                                                                    SHA1:DAB706F52B7F6099286D659EFC24ADBAD9F5A4F2
                                                                                                                                                                                                                                                    SHA-256:A87B9926FBC7C17D884ABE1D8E4B81335476B00FFE76196E38AF8542E2D7881D
                                                                                                                                                                                                                                                    SHA-512:96145B505C3726878162EF4AE328F08888F1CBCF3C3D8AADFCE4E72398651D1B120C4D219176E107F99BD682D968D3C8F02AA8BF600007033AAC07064127A8EA
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........S&..e.....h.....i.....j.....k.....l.....n.&...o.+...p.8...q.>...r.J...s.[...t.d...v.y...w.....y.....z.....|.....}.....................................................................................5.....L...........S.................'.......................;.......................m.................0.............................}.........................................*.................^.....v.................C.....L.................".....-.................&.....7...........(.....{.......................9.....K.............................i.......................O.......................\.......................U.......................E.......................5.......................C.......................f.......................N.......................).....u.......................^.......................>.....V.....b...........#.....T.....c...........0.....q............ ..... ..... ..... ....S!.....!.....!....."....k"....."....."....."....G#.....#.....#.....#.....$....o$.....$
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):508553
                                                                                                                                                                                                                                                    Entropy (8bit):5.428763068409714
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:40B668B73BBF3575D009F3D528D388E5
                                                                                                                                                                                                                                                    SHA1:E7186E4796216615F388C8A8058D898C4913F2FD
                                                                                                                                                                                                                                                    SHA-256:8813FA272B1A12042C75B97848605C8DA7D306AC7AAA4F231D41EE98D9E70538
                                                                                                                                                                                                                                                    SHA-512:8858E78493FBDBE1B2B99BCE75DAAC585F40EEA2612D80D82850F7957F0EF69C3A1F3DC7C011427CB1E64CD667031DEBD3B3D160BB9C2146224377A99B74798A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........*&#.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.!...v.6...w.C...y.I...z.X...|.^...}.p.....x.....}...............................................................................................}.................[.................3.................!......................./.............................v.......................w.................&.................H.....k...........x.................R...................................S.....m.............................L.............................m.......................P.....u.................L.......................X.......................^.......................S.....|.................J.....x.................p.................&.....~.......................b.......................G.....i.....{...........h.................9.......................? ..... ..... ..... ....T!.....!.....!.....!....b".....".....#.....#.....#....+$....u$.....$.....%....f%.....%.....%.....%....A&....^&....l&.....&....6'....e'
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):525362
                                                                                                                                                                                                                                                    Entropy (8bit):5.366124885898627
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:6E38F51EBC9B4AF616C984ACFEF7323E
                                                                                                                                                                                                                                                    SHA1:1D871E09B051CDF1429FBB68FC43B7631DAD9438
                                                                                                                                                                                                                                                    SHA-256:E3ED1D14209965FACA5AC6A2B4026A4A28D21F5096E0C44943E731279190D540
                                                                                                                                                                                                                                                    SHA-512:4124F5ED6E9AC7701837AAE5458DB96DF8303FFF05ECBAB40D938CF0FDE3C5F2F696D07F0BE2227040A14336D2701F8A76342550419630F51C073070DC705492
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&3.e.z...h.~...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.#...z.2...|.8...}.J.....R.....W....._.....g.....o.....v.....}.....................................................U.................4.................@.....T...........;.......................c.......................[.......................?.....g.....u...........M.......................}.................4.......................=......................._.................(.................g.......................C.....W.......................$.....y.......................h.......................j.......................O.......................,.............................v.................,.......................N.......................?.......................".....x.................&.......................B.......................$.......................C.......................z ..... ....P!....a!.....!....O"....."....."....##.....#.....#.....#.....$....j$.....$.....$.....%....`%.....%
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):587942
                                                                                                                                                                                                                                                    Entropy (8bit):5.759897632158159
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:2D6468A89698A05B8522F679825572D3
                                                                                                                                                                                                                                                    SHA1:52EC81BC896051ED8A865B44C58F82EABA6B89B9
                                                                                                                                                                                                                                                    SHA-256:477E505459C80A8477FA6EF1B8A0FAF16C5E450B69CF922C37BBE020A088E695
                                                                                                                                                                                                                                                    SHA-512:59A95F05D071C739D4DC1456B856D0283AD3D99AC35EC300EC38E76AB236BA6D6E83598D0823D46C07D62EE0457F2958C682F4EFA3EADB824A254F48387EC538
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:......../&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.#...v.8...w.E...y.K...z.Z...|.`...}.r.....z...............................................................................................(.......................{.................Z...........$.....B.................F.....\.................=.....Q.................P.....b...........9.....o...................................h.......................~.................&...........#.....n...................................w.......................7.............................I.....j.....x...........A.....z.................I.....|.................C.....t................./.....[.....k...........'.....[.....l...........V.......................U.....r.................2.....S.....y...........(.....i.....~...........P.................#.....i.................. ....Q ....w ..... .....!....p!.....!.....!....R".....".....#....,#.....#...."$....e$.....$.....$....J%....w%.....%.....%.....&....7&....F&.....&.....'....\'
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):551569
                                                                                                                                                                                                                                                    Entropy (8bit):5.417670979179483
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:FBD585195E35E49C60A9190FBF815E86
                                                                                                                                                                                                                                                    SHA1:F88FE564784D0441A304A4B126DE27FB2B0412EE
                                                                                                                                                                                                                                                    SHA-256:ED647E78BC3E89A6322A7198DD1875034AC3CDA355BA6837EA0D4686D56712CD
                                                                                                                                                                                                                                                    SHA-512:22596E824D2226C8E0773F323FDDCB1A0C7523EE2077C38205EDB5B11EF15DE3C5768B8C598A781BDC49BE91C3B1B22BA92C3DA5E0BE6ACB5DF42670487E68E0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........2&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s."...t.+...v.@...w.M...y.S...z.b...|.h...}.z.....................................................................................................).......................m.................I...........5.....R.................Q.....f.................6.....F.................%.....>...........2.....x...................................x...........$.....5.................:.....N...........<.................4.................$.....s.......................S.......................Q.......................T.......................W.......................9.............................g.......................\.................).......................^.......................-.....y.................P.....{...........$.................$.....p.................. ....T ....{ ..... .....!....^!.....!.....!....H".....".....#....2#.....#....3$....}$.....$.....%....Z%.....%.....%.....%....2&....X&....m&.....&....E'.....'.....'.....(
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):555353
                                                                                                                                                                                                                                                    Entropy (8bit):5.392038775374042
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:C64146716C2A401FEC538E4C79785144
                                                                                                                                                                                                                                                    SHA1:3C5D0B45225A39A65C0345E5C98A4E539D807FE1
                                                                                                                                                                                                                                                    SHA-256:904189CAAEF1E278EE31432F8995BFC150975250FA355683E1CEF1B5C79D3BF3
                                                                                                                                                                                                                                                    SHA-512:CE8336F4C83E47779169B3F875D8910F7C30CF7BCA2CF77C398C37E32FDC8C01A43B5EF74CFD03C3ABE8E3979454EBB1396CEA7449640025423D2B1F565A5C0C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........I&..e.....h.....i.....j.....k.....l.....n.....o. ...p.-...q.3...r.?...s.P...t.Y...v.n...w.{...y.....z.....|.....}.....................................................................................".....4...........H.................&.......................u...........U.....p...........[.......................f.......................G.....t.................t.................Z.................2.................K.....X.................W.....g...........9.........................................e.......................P.......................H.......................X.......................`.......................K.......................$.....z.......................h.........................................H....................... .....`.....z.................O.....|.................o.................>........................ ....o ..... ..... ....*!....{!.....!.....!....i"....."....D#....\#.....#....L$.....$.....$....1%.....%.....%.....%....@&.....&.....&.....&....3'.....'.....'
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):574388
                                                                                                                                                                                                                                                    Entropy (8bit):5.451836104471441
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:C613CAB2C2D6AC5B88E21FCB65671F19
                                                                                                                                                                                                                                                    SHA1:291D545427FEAF8DA9DD75679ADA1BB70C66EB47
                                                                                                                                                                                                                                                    SHA-256:8EDD01CC74EB965CFA4CB35249097D114F554B8D80883D7C7E335A857F33A810
                                                                                                                                                                                                                                                    SHA-512:1E826936C1636F7D5DA9870DD362984E2DEDB8F3BFFE3F64D8615BC955F4A1C2E988E7FB60387743949C200DF073FBB7B27DC3B6A66BA9D7950571CA2DD2FE57
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.!...v.6...w.C...y.I...z.X...|.^...}.p.....x.....}...................................................................................{...........Y.....s...........4.....m...................................y...........$.....C.......................%.....|...................................".....S...........A.........................................P.......................g.................#...........3.......................U.....s.................&.....K....._.................$.....4.......................4.......................+.............................Y.......................8.......................S.................5.............................W.......................V.......................q.................\.......................$............ ....; ....V ..... .....!....Z!....o!.....!....l"....."....."....a#.....#.....$....7$.....$.....%....F%....^%.....%.....%.... &....6&.....&.....'....s'
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):941599
                                                                                                                                                                                                                                                    Entropy (8bit):4.851052751447414
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:36D9CBBB31930EB5B78378EC63751BE6
                                                                                                                                                                                                                                                    SHA1:5D123C38941CC4E59570254909291B29970F0CE1
                                                                                                                                                                                                                                                    SHA-256:DE90BA6507DC032C853FC61BDBF9218A29FF70379B571B1F4F3D7A28C3902479
                                                                                                                                                                                                                                                    SHA-512:EACCC7FBDF3E9D9C9EB1A602C1BF17C8BAFC920EBD058C4D2C496B95BB1B3FABCDFC87D1747BFD8CD404DE75C887038A99717BE7960BC808B632039EC9F80A06
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%..e.H...h.L...i.]...j.i...k.x...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}....... .....%.....-.....5.....=.....D.....K.....R.....S.....T.....V.....s.............................P.......................2.......................c.......................!.....f...........O...........W.....z...........,.....p...........;...........-.....i.....\.............................,.....~...........Z...........;.....`.................B.....o.....s.....m...........<...........O.....|...........=.......................~.................9...........>.....w...........B............ ....A ..... ....D!.....!.....!....."....."....."....."....a#.....#.....$.... $....2%.....%....~&.....&....3'.....'.....'.....'....s(.....(.....(.....).....)....+*.....*.....*.....+....M,.....,.....-.....-.....-....%.....7...........f/...../...../.....0.....1.....1.....1.....2....A3.....3.....3.....4.....5....:6.....6....87.....7.....7.....8.....8.....9....E9....^9....6:.....:....S;
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):592404
                                                                                                                                                                                                                                                    Entropy (8bit):5.807054231111397
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:59822645439846B0A211C8566E7CF90E
                                                                                                                                                                                                                                                    SHA1:F4EDAE1B34DF718FD72EBEBD6DC9E36CFEF95584
                                                                                                                                                                                                                                                    SHA-256:60319C30E94770472017E83ED0309A8F134F0D60E38261F53517EA23E9658C09
                                                                                                                                                                                                                                                    SHA-512:E2A7295BBFD5E721C765F90FAE0AD1420902A916E837E1B0BD564BB9EB553908EADEA58739F21D75C9F38CD3D1E821DCF14545884462FAA3F70617AFC764B84A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........2&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.%...t.....v.C...w.P...y.V...z.e...|.k...}.}.....................................................................................................S.................W.............................&.....u.................`......................................... .....z.................6...................................Q.....t...........k.................1.......................u.........../.....F...........k.................9.....................................................|.........................................S.......................h.......................y...........'.....:.................F.....Y...........s.................(.....v.......................Z.....v.................U.................- ..... ..... .....!....o!.....!.....!.....!....s".....".....".....#.....#.....#....@$....Z$.....$.....%.....%.....&.....&.....&....8'....Y'.....'....*(....Y(....m(.....(.....)....>)....R).....)....I*.....*
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):568760
                                                                                                                                                                                                                                                    Entropy (8bit):5.4785168337779435
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:970F310ACBAFA4A29E0CFA5C979DF397
                                                                                                                                                                                                                                                    SHA1:B1C20EEFC61785C3CBAF7D6D3B5FD2B144CC1EF5
                                                                                                                                                                                                                                                    SHA-256:B4EFD0CE0957A00E2E617A3E595B471ADFDFBDEE333C14BA41B8DC8BB5653324
                                                                                                                                                                                                                                                    SHA-512:D1DF03814C42819F94A7CF3FA54D699AC8A844C69303CEAED97BA3D3512406161F011120395904B473EACA29D8959B9A14C85D90A880508611E80A46B9D97575
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&3.e.z...h.~...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.!...z.0...|.6...}.H.....P.....U.....].....e.....m.....t.....{.....................................................[...........=.....V...........,.....].....n...........z.................N.......................S.......................E.......................W...................................B.....c...........A.....{.................e.................1...................................l.................A.....X.....p...........".....E.....U.................:.....M...........0.....l.................G.....z.................q.................&.......................'.......................6.......................Z.......................B.......................9.......................`.................3.................. ..... ..... ..... .... !....4!.....!....."....D"....\".....#.....#.....$....1$.....$....f%.....%.....%....e&.....&.....&.....'....a'.....'.....'.....'....S(.....(.....(
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):872667
                                                                                                                                                                                                                                                    Entropy (8bit):4.788135484665425
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:5E439D9D281D90569CD4AA231FC8B287
                                                                                                                                                                                                                                                    SHA1:AA8D4E28770F430DD7F93E2B9879748A97C74FB0
                                                                                                                                                                                                                                                    SHA-256:9082215832960416F3E6B43D2F76869A8632506BFE3A806A1B46C858B1370806
                                                                                                                                                                                                                                                    SHA-512:C9491A35C082B1BB7C08B732D6F07DBFFA5BB955988141D3C56D3F482D9FA74763EB196AA7F37445808163AB790A0B23091C06F81EBACB94BD164DC72B01A71C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........<&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.%...s.6...t.?...v.T...w.a...y.g...z.v...|.|...}.....................................................................................>.....s.....`.............................:.............................#.....W.................H.....}.....$.............................!.....h...........Q...........@.....{.....{.....9.......................a.......................A.......................e.................$.......................j.................3...........8.....r...........! ..... ..... ..... .....!....J"....."....."....}#.....$....R$....s$.....%.....%.....%.....%.....&.....'....Q'....r'.....(.....(.....(.....).....).....*.....+....3+.....+....9,....q,.....,....8-.....-.....-................Z/...../...../.....0....#1.....1.....1....z2.....2.....3....L3.....4.....4.....4.....5.....5....{6.....6....-7.....8.....8.....9.....9.....:....5;.....;.....;.....<....4=.....=.....=....2>.....>.....>.....>.....?....q@.....@
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):512705
                                                                                                                                                                                                                                                    Entropy (8bit):5.538975019723545
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:D31FED9E04F8915045F6A2CC7BD4C9FE
                                                                                                                                                                                                                                                    SHA1:8C68186DC5463D4E45889E8DE021536110B09453
                                                                                                                                                                                                                                                    SHA-256:931598B71AD77874A64294614BA73B426A717F343674FCEB7BAEE227D4413B9D
                                                                                                                                                                                                                                                    SHA-512:3C9D2F8F655006722AC5B08E8575EDAC9CCE21061B3A8696B8E772734A12BBFE04C53838DEC475887DBC82501E90A8799ACE71DC49BA05CF766037D001852493
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%V.e.4...h.8...i.I...j.U...k.d...l.o...n.w...o.|...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................!.....).....0.....7.....>.....?.....@.....B.....S.....e.....y...................................Y...................................b.....{...........K.......................V.......................U.......................z.................L.................$.........................................8.....H...........D.................@.................M.......................".....z.......................W.......................K.......................X.......................M.......................=.......................4.......................?.......................T.......................-.....}.......................N.....o.................Y.................$.....z.......................k.................. ....a ..... ..... ....,!.....!....."...."".....".....#....I#....o#.....#....;$....k$....~$.....$.....%....6%....D%.....%.....&....1&
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):539452
                                                                                                                                                                                                                                                    Entropy (8bit):5.338235032300934
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:F0314E8F5AF94C845AB4218468AF3454
                                                                                                                                                                                                                                                    SHA1:4ABFA3D5D114AE89CB449F83C1267DA3DB0EF8BE
                                                                                                                                                                                                                                                    SHA-256:0CE0651A673A250FA86E6A9DF4EC490C832F045E07617343F015599687AA84E8
                                                                                                                                                                                                                                                    SHA-512:11E6CA00ACD7D65495F7C04BA5E558DAAD835C48BD230F616DE62954B9E10FC45E816E049E1ADB858B29D335DA08808B560F04C8A6AED83B62ED722F1968C08F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........)&$.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.(...w.5...y.;...z.J...|.P...}.b.....j.....o.....w.............................................................................u...........D.....Z...........).....h.....z...........m.................2.......................$.....w.......................\.......................f.................H.................,.................8.....H.......................<.................=.....Q...........`.................3.............................Q.....t.....}.................=.....I...........,.....w.................6.....j.....|...........@.....}.................0....._.....l...........&....._.....h...........L.......................^.......................h.................*.....z.................F.......................x.......................S.......................a ..... .....!....#!.....!....."....u".....".....#....k#.....#.....#....T$.....$.....%.....%.....%.....%.....&....,&.....&.....'....['
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1387366
                                                                                                                                                                                                                                                    Entropy (8bit):4.061553280377292
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:4411E4698E279FB95ADEA7BE9625F800
                                                                                                                                                                                                                                                    SHA1:A3C655D334442CF5EF106B92F9778C9B3FBC252A
                                                                                                                                                                                                                                                    SHA-256:BEABEEA92C3FB9C52C22BADD99D686F1690E3574C75CD7A886320FB2CAC53D92
                                                                                                                                                                                                                                                    SHA-512:4406ADF5F7BEB86A49695FFF0A3E92E108AC2EE4DAAE46821C74164018FBD72E6D1DDA7C3B689B30A1F19C17B13B0C1BF0537C966ABE88137A0135D04483BF41
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........&7.e.r...h.v...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.*...|.0...}.B.....J.....O.....W....._.....g.....n.....u.....|.....}.....~.........................................{.....A.....j.............................n.......................5.....k...........9.....:.....-................................... .....X.....\...........G.......................#.....D.....Z ..... ....@!.....".....#....L$....}$.....%....&'.....'....U(.....).....+.....,....^,....a-....*.....~............/.....0.....0....-1.....2.....2....K3.....3.....4.....5....F6.....6.....7....z8.....8....-9.....:.....;....y;.....;.....<.....=.....>....<>....6?....'@.....@.....@..../B.....C....\D.....D.....E.....F.....F....4G.....H.....H....;I.....I....aJ....JK.....L....bL.....M.....N.....O.....O....yP....?Q.....Q.....Q.....S.....T.....T.....T....qV.....W....eX.....X.....Z.....\.....^....8^....._.....`....Va.....a....6c....\d.....e....me....qf....^g.....g.....h....Pi.....j.....k
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1281329
                                                                                                                                                                                                                                                    Entropy (8bit):4.31693967998977
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:443D47F30632512C7E5A6E142D2A3CA3
                                                                                                                                                                                                                                                    SHA1:98730D4194266544C204E11E30C1817A5C8DFAE6
                                                                                                                                                                                                                                                    SHA-256:12267195833FF2F15F99947478C75EEB18923EB125AAF7118A0F398045636E33
                                                                                                                                                                                                                                                    SHA-512:34A02D50B300E8283A896BA492277FB6D2C16BFEEF88B30344C803D060DC50FA638BECA10F5113EBFE23D6E5882D82D072303112008FA721FF20EA087385C71C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........I&..e.....h.....i.....j.....k.....l.....n.$...o.)...p.6...q.<...r.H...s.Y...t.b...v.w...w.....y.....z.....|.....}.........................................................................).....].........................................a.....S...........<.............................>.....W...........1.......................D.....S.....#.............................7.................D...........p.................0 ....q .....!....."....4#....w#.....$.....&.....'....I'.....(..../*.....+....i+....T,.....-....Y-.....-..........|/...../....(0....<1.....2....l2.....2.....3.....4....x5.....5.....7.....7....Z8.....8.....9.....:.....;....J;....i<....9=.....=.....=.....?.....?....d@.....@.....B.....B.....C.....C.....D.....E.....E....+F.....F.....G.....G.....G.....H....rI....3J....kJ.....K.....L....RM.....M.....N.....O.....O....LP.....Q....jR.....R....;S.....T....>U.....U....!V.....W.....Y.....Z.....Z....v\.....]....:^.....^.....`.....`.....a.....a.....b.....c.....d....Kd.....e.....f....Ng
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1076392
                                                                                                                                                                                                                                                    Entropy (8bit):4.3678914271676845
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:ABFAD720A09628E229EE75C14DCC1DEE
                                                                                                                                                                                                                                                    SHA1:80A075F9714D4C3BAFF06E1935B304558C3D597E
                                                                                                                                                                                                                                                    SHA-256:0C8332F2C81038A69282A049FD59EC76F2370F329F9AEFF9A54AE1B0AB83AFB1
                                                                                                                                                                                                                                                    SHA-512:D43A39699ED5F0E55A4491B726B44CF6238C9FB69C919F5DBFFBF6627221C524737115AC4FF604A1B6208AF7CAD52192CE896A6C57EEBE3A9BB721F9EC57ADBD
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........Y%..e.....h.....i.....j.....k.....l.$...o.,...p.9...q.?...r.K...s.\...t.e...v.z...w.....y.....z.....|.....}...............................................................................).....S.............................................................................6.....u.................+.....|...................................(.....p.................g...........P.....G...........X...........w..... .......................4.......................B...............................................q............ ..... ....|!.....!....."....."....f#.....#.....#.....$....n%.....%.....&.....&.....'.....(....&(.....(.....).....*....:*.....*.....+.....+.....+.....,.....-.....-..........4/....10.....0.....1.....1....\2.....2.....2.....3.....4....a4.....4....65.....5.....6....M6....m7...."8.....8....(9.....9....=:....t:.....:....y;.....<....b<.....<.....=.....>.....>.....>.....?.....@....jA.....A.....B.....C.....D.....D.....E.....F.....G....FG.....G.....H.....H.....I.....J.....J....pK
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):550618
                                                                                                                                                                                                                                                    Entropy (8bit):5.609493488679069
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:CE85F55613C69479E13D011F0B81E3F1
                                                                                                                                                                                                                                                    SHA1:07C31DF75DEECEC1BC09FFCD473B885EF0467B42
                                                                                                                                                                                                                                                    SHA-256:EEA13AECCB9DC35CF6E5135BCAB2F376D584CDEFC4B2970ED1126F8C2043AFCC
                                                                                                                                                                                                                                                    SHA-512:3A6C6015003A09295AB4CA7BBBC421F281E3A8719C56EF9D0BB4448413656778DA7C70D7F67FCBED7051E562027CBD7BCEA84596E48AADA64193AF448002120C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........Y&..e.....h.....i.....j.....k.&...l.1...n.9...o.>...p.K...q.Q...r.]...s.n...t.w...v.....w.....y.....z.....|.....}...............................................................................2.....G.....a.............................c...................................X.....s...........4.....o.................+.....R.....a.................D.....V...........&.....X.....z...........m.................2.......................1.......................>...................................A.....Y.................C....._.................M.....^.................H.....X...........#.....Z.....g...........6.....m.....~...........?.....q.....~...........:.....j.....v...........;.....o.....|.............................S.......................T.......................4.......................G.......................e.......................L ..... ..... ..... ....d!.....!.....!....."....."....b#.....#.....#....z$.....$....6%....Z%.....%....`&.....&.....&....)'.....'.....'.....'....@(.....(.....(
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):938457
                                                                                                                                                                                                                                                    Entropy (8bit):4.888192308730272
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:E72DBF8C00F7C211D1A220DB30EC7A7E
                                                                                                                                                                                                                                                    SHA1:8F891C83E0FBAA78A8267CF5B54462BD64DE9C6F
                                                                                                                                                                                                                                                    SHA-256:B1892427972D0454F8B85AF85DCC074393FFBCB2381EA91EFB2E85EB03FF2A04
                                                                                                                                                                                                                                                    SHA-512:D1F3E5DBC50B14FEADFC30999C89DB1A0431E4758EE82CF18DA81F991CDF76C3298FD98D3CB3E2AB902A11C8A7E11C6D7645E1ED91ED5F3280A4420C1FB793D0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%q.e.....h.....i.....j.....k.....l.9...n.A...o.F...p.S...q.Y...r.e...s.v...t.....v.....w.....y.....z.....|.....}.........................................................................,.....E.....o.................X.......................Q......................._.......................z...........)...........L.................j...........V.....k.....'.................L.....9...........{...........i...........c...........1...........%.....F.................$.....Q.....@.......................T.................#...........,.....l.........................................8 ..... ..... ....V!.....!....0"....K"....."....\#.....#.....#....N$.....$.....%....3%.....%....F&.....&.....&.....'....t(.....)....?).....)....Q*.....*.....*....*+.....+.....+.....+.....,..../-.....-.....-..........l/...../....[0.....0....\1.....1.....1....d2.....2....(3....U3....,4.....4....25....^5....P6....$7.....7.....7.....8.....9.....:....Y:.....;.....;.....;.....<.....<.....=....U=....r=....F>.....>....b?
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):817673
                                                                                                                                                                                                                                                    Entropy (8bit):5.177156515939135
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:3129155651C81F86E5E2794B0CD15EC7
                                                                                                                                                                                                                                                    SHA1:FB3D6C2156E1230C099B02171F3E9100FBE542A8
                                                                                                                                                                                                                                                    SHA-256:67B353376ECC45F0271CB2526B96AEB681F717968C35397F7E53AA43D3D31D08
                                                                                                                                                                                                                                                    SHA-512:31831DEAD97B53E600317091DC08807D1D040A1FC27753CCEB4104A865583C79E1EC68FE6AB644819EF49F262981ADB6EF38D67CB53CB3FDDD43271780FEFCEB
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........-& .e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.-...w.:...y.@...z.O...|.U...}.g.....o.....t.....|.........................................................................................;.....b.......................R.....1...........m...........U...........\...............................................Z.....}...................................\.......................6.................W...........S.....p.....C...........}.................N.............................,.....T...........?.....|...............................................S.....q...... ..... ..... .....!.....!....."....Y"....u"....."....q#.....#.....#....\$.....$....*%....F%.....&.....&....3'....^'.....'....n(.....(.....(....d).....).....).... *.....*....'+....m+.....+....U,.....,....Q-.....-............................./....&0....x0.....0....p1.....1....j2.....2....k3.....4.....4.....4.....5....W6.....6.....7.....7....w8.....8.....9.....9.....:....]:.....:..../;.....;.....<
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):651358
                                                                                                                                                                                                                                                    Entropy (8bit):5.790776889845594
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:5910DEDFBC84629690DD59478E80B51A
                                                                                                                                                                                                                                                    SHA1:AF6E9281C779E40ACF1A8A1EABB1AA926AB85F85
                                                                                                                                                                                                                                                    SHA-256:0832B96542456367261A215719ACDCC394A027C04A4F0C313F9401D6B222F756
                                                                                                                                                                                                                                                    SHA-512:1BD32EFA3D034442D85D2478EFA8180E11126E80F03097B813CCFD4521039E186342CC9EFAA47809DB9852ADA3541B76E668D43C7A427D2410DAB6C0A1BA1B2C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%q.e.....h.....i.....j.(...k.7...l.B...n.J...o.O...p.\...q.b...r.n...s.....t.....v.....w.....y.....z.....|.....}.........................................................................&.....7.....`...........7...........U.....q...................................*.................?.................%.....z.......................o.................!...........@.................}..... .................I...........&.....8...........7.................?...........$.....L.......................,.................'.....F...........&.....P.....a...........A.....}...................................V.......................k......................................... .................C.....U.................. ....% ..... .....!....O!....n!.....!....C"....m"....."....d#.....#.....#....c$.....$...._%.....%....)&.....&.....&.....&....w'.....'....!(....D(.....(....>).....).....)....]*.....+....s+.....+....L,.....,....J-.....-..........m.................&/...../...../...../....s0.....1....[1....|1
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):472125
                                                                                                                                                                                                                                                    Entropy (8bit):6.686635546459109
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:79D8DDFE89B3B2B37BBBF85AFD6E6D67
                                                                                                                                                                                                                                                    SHA1:0D0316D3D1DA0D13D2C568F0FAB9116996998C7C
                                                                                                                                                                                                                                                    SHA-256:ABBF9199B7751AD09750361E2EE861876EE44D65020B7D1255C45DFF911BCF89
                                                                                                                                                                                                                                                    SHA-512:5F6B736B835DF71BA67906710BF86CDEB37542642CC03FFE6CC73557C2BE35CE99C5838739B160D26545D7A55E4263DEE7E55E942307F7D8657E3E8FAFDE5114
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%..e.....h.....i.....j.....k.....l.....m.....o.....p.....q.....r.....s.....t.....v.....w. ...|.&...}.8.....@.....H.....S.....[.....j.....o.....w.....~...............................................B.......................s.......................q.......................|.................2.............................X.......................7.......................7.......................S.......................D.......................*.......................1.......................4.....w.......................>.....d.....p.................#.....2.................:.....L.......................&.............................d.......................<.......................?.......................P.......................'.....u.......................h.......................K.............................H.....T.................6.....H.................?....._...........H.......................n.......................k.......................3 ....Q ....a ..... .....!....A!....S!.....!
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):469061
                                                                                                                                                                                                                                                    Entropy (8bit):6.698957808032297
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:687995F645CB9169DBFC3431E8FCFE3B
                                                                                                                                                                                                                                                    SHA1:D6931394363D7C479791B32C8AD268786FFCE8AF
                                                                                                                                                                                                                                                    SHA-256:35A0323EB90FA53859961F832BCB66C391F53E6449722F6FDC136D92484C47C9
                                                                                                                                                                                                                                                    SHA-512:FAAAD1CE95650FA67AA7E86F2453DEDC70C6E206BB15DBA4E824BB0D540D884A09A75A48A9E36FEEB83B75232258B7431B1F3DF53A824FA322B3C4E87BEABA14
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........%..e.Z...h.^...i.o...j.s...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......%.....*.....2.....:.....A.....H.....O.....Q.....V....._.....k.....z.................y.......................q.......................f.......................Z.......................A.....j.....v.................3.....@.......................0.......................1.............................r.......................a.......................w.................1.....}......................./.....{.......................F.....i.....x........... .....I.....U.................&.....2.......................!.....s.......................K.......................<.......................2.....x.......................>.....X.................<.....N.................,.....O.............................P.......................;.......................D.........................................0.............................[.............................h.................. ....Z
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1051021
                                                                                                                                                                                                                                                    Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                                                                    SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                                                                    SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                                                                    SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):18401792
                                                                                                                                                                                                                                                    Entropy (8bit):6.484724602010289
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:6A067CB26AF2C240C240BC81C4A4F311
                                                                                                                                                                                                                                                    SHA1:CFB1A89616DC14830EB073F4CD84AC4EB14B4534
                                                                                                                                                                                                                                                    SHA-256:C1E6EF50932D0CD9EDF8FF4C663CFCCA358F2E2D5349B3B7904E4D4D8F6D8882
                                                                                                                                                                                                                                                    SHA-512:25520B39C834BAAC056958C22EBA1B2317B0D7967F351C66BA6177FB9FFC3FD4B6C0E8489CFBD8B2E477854F75163856F23775BAE6B8A0721048FD961E276BAD
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...Bx.e.........." ................L.........................................B...........`..............................................#...2..,.... A.......;..n...........0A.\t..|...........................(.......8............P...............................text............................... ..`.rdata....... ......................@..@.data...@9*..@......................@....pdata...n....;..p..................@..@.gxfg.........?......V..............@..@.retplne......@......F...................tls....a.....@......H..............@....voltbl.......A......J.................._RDATA........A......L..............@..@.rsrc........ A......N..............@..@.reloc..\t...0A..v...T..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1162240
                                                                                                                                                                                                                                                    Entropy (8bit):6.551791881008996
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:EDF83410995BEA188731EF377334ED7B
                                                                                                                                                                                                                                                    SHA1:B12C8925409701725749A9EBCC9D6CBFDB0122DD
                                                                                                                                                                                                                                                    SHA-256:B464548564A8B97682560630127AA447D25FE692F887A4822A36B2EF8F250E97
                                                                                                                                                                                                                                                    SHA-512:A14B61223B0D2E1A7389934559EEC5279A1C2B0C713B0FDAA08F4F979A3B37D8BADED355B42AEF5FEA13A254AF177F5EB152C6C009985F3294C5097035907EE2
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........."............................@..........................................`.............................................\...t........p.......P..................................................(...0...8...........0................................text...F........................... ..`.rdata..............................@..@.data...........@..................@....pdata.......P......................@..@.gxfg....,...........`..............@..@.retplne.................................tls......... ......................@....voltbl.F....0..........................CPADinfo8....@......................@..._RDATA.......P......................@..@malloc_h0....`...................... ..`.rsrc........p......................@..@.reloc..............................@..B................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):196713984
                                                                                                                                                                                                                                                    Entropy (8bit):6.709853681888895
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:0B9A2D445F28B403D525380817A2636E
                                                                                                                                                                                                                                                    SHA1:E4BECC1533A42871BA87A06D039D3477ABE4F79A
                                                                                                                                                                                                                                                    SHA-256:264773127DEA00204A3A52BAE4A4510D610292FDD759B7EAF40BD1B59AD88C6B
                                                                                                                                                                                                                                                    SHA-512:45BF3DC8C1B118AE26B6A4436591D1B15B339BC6BD8E69E112F0F6ADDB834B0CFD8958AC63BFC712C4A7D9C365FC6944AB80F0D61765170ADF67B5535DEE12E1
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .........`...... S....................................................`A........................................G.-..!..../.|.......p.....R..B^..............T...i .8................... b .(...@..8............./......U-.`....................text..."........................... ..`.rdata..X.... ......................@..@.data... .... 4.......4.............@....pdata...B^...R..D^...>.............@..@.gxfg...0C.......D...@..............@..@.retplne.....`...........................rodata......p...................... ..`.tls....A...........................@....voltbl.v...............................CPADinfo8...........................@...LZMADEC............................. ..`_RDATA.............................@..@malloc_h0.......................... ..`.rsrc...p...........................@..@.reloc...T.......V...H..............@..B................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):685745
                                                                                                                                                                                                                                                    Entropy (8bit):7.962986984739525
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:9B46F4C8DFC0A55BFAFAC55F17D7659B
                                                                                                                                                                                                                                                    SHA1:D25F27DF176AADB67BC56A42262BCCAFD14AF4F4
                                                                                                                                                                                                                                                    SHA-256:B637AE345B830649B4027F39F6EE48F92484A2ACB65DE498E4FDD84EC1010336
                                                                                                                                                                                                                                                    SHA-512:DE5F500AFE381A16E3FF7DDCB5C8AA538362E55222F7915276BB4C9261E41CBC2403CA1663A7DBF0706D8D51ABC420E26804F67CFD646D7986130A20A659F345
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:..........O............... ...........@.........p?....q?h...r?...s?<...t?....u?....v?h...w?...x?&...y?....z?...{?9...|?....}?...~?N....?.....?.....?J....?.....?}....?.....?....?1....?O....?.....?.....?.....?.....?%....?.....?.....?.....?.....?.....?m....?5....?.....?.....?.....?0....?.....?.....?e....?.....?u....?.&...?>'...?.'...?.(...?G)...?.)...?.2...?.<...?.P...?.c...?Ce...?yf...?.h...?jk...?.n...?.w...?.....?D....?.....?.....?+....?z....?&....?.....?.....?(....?.....?.....?.....?.....?6....?4....?.....?.....?.....?@....?.....?.....?.!...?]*...?.2...?38...?.@...?.A...?._...?/y...?.....?`....?9....?.....?U....?.....?.$...?S7...?E`...?.t...?p....?.....?K....?&....?.....?.....?.....?A....?.....?.!...?.+...?.3...?u;...?.C...?.H...?rT...?.^...?.b...?[g...?yl...?.}...?.....?.....?k....?n....?"....@.....@.....@.....@f....@.*...@M@...@.Q...@.c...@kq...@W{...@Q....@X....@c....@.....@j....@O....@R....@S....@....&@g...'@Z...(@....)@....*@....+@....,@....-@V....@..../@D...0@.8..1@.9..2@.<
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1079219
                                                                                                                                                                                                                                                    Entropy (8bit):7.95049008504143
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:F666B710DA2BED9AC0252C1FA1D00C4A
                                                                                                                                                                                                                                                    SHA1:0D8288FDE82C2F3B7BD006FCF4CB92246AEFAF6D
                                                                                                                                                                                                                                                    SHA-256:F1AB589CFD40FB17A7C390B45FFAD8FCF90C133FFF1D14CA5BFC7053A21DC241
                                                                                                                                                                                                                                                    SHA-512:982BB5EA2C14170D47E150DC8692EBE316EC5D6B584377020C1F58AE0632748CB631182A6BFAD2F909EF6B818B012527367A36D8681B5B56DC735B8CCAF7B52F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:..........O.........+...........|.....#.........p?....q?@...r?....s?,...t?....u?....v?|...w?...x?R...y?...z?'...{?....|?....}?V...~?....?.....?.....?....?I....?.....?A....?.....?.....?.....?~....?d....?.%...?.C...?.Y...?vn...?Qp...?.p...?Br...?.y...?Rz...?.|...?.~...?U....?.....?X....?....?.....?.....?.....?.....?.....?X....?.....?.....?.....?g....?.....?*....?.....?.8...?.:...?z<...?.>...?.D...?OJ...?._...?.p...?o....?%....?.....?[....?....?.....?.....?.....?.....?.....?.+...?.>...?.M...?Ra...?4u...?.....?]....?.....?.....?.....?.....?. ...?^4...?.L...?.[...?.t...?.w...?.....?u....?.....?.....?.....?.....?.+...? >...?7Z...?.l...?.....?t....?:....?.....?-....?.....?.....?.....?.(...?_7...?.L...?.X...?.b...?]i...?.q...?.z...?i....?.....?;....?.....?.....?....?z....?.....?H'...?.S...?.t...?d....@.....@S....@\....@.....@.H...@.v...@M....@.....@.....@a....@.....@.....@oI...@6....@.....@,....@....@.....@:...&@....'@....(@0...)@....*@*...+@....,@....-@h(...@94../@v>..0@....1@....2@..
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1134592
                                                                                                                                                                                                                                                    Entropy (8bit):6.555043286804751
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:364F839CA8DE4D942270D9097D48EF15
                                                                                                                                                                                                                                                    SHA1:82C8040DC2A733EB3EA3E051513C84F992BB17F1
                                                                                                                                                                                                                                                    SHA-256:A4E521C12FE47816F2D9E2DFED9FD074E370EC587D0A0F3A03B5AEBB76C06560
                                                                                                                                                                                                                                                    SHA-512:BAF1ED5E558DC0AE037FE0DFF036792CFBD338915C8AF99D10F0202B92CA820298657A86A0F3E8C1387326FDA34DE3EE08649C34AF2417159A24AED9CED02DF3
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .....V...........).......................................@............`A....................................................<.......8.................... ..<....~..8....................}..(...@...8............................................text...-T.......V.................. ..`.rdata.......p.......Z..............@..@.data...T....@...B...*..............@....pdata...............l..............@..@.crthunk.....p......................@..@.gxfg... ,..........................@..@.retplne.............$...................tls.................&..............@....voltbl.B............(..................CPADinfo8............*..............@..._RDATA...............,..............@..@malloc_h0........................... ..`.rsrc...8............0..............@..@.reloc..<.... .......8..............@..B........................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4656369
                                                                                                                                                                                                                                                    Entropy (8bit):7.995866504972196
                                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:0F1D45867B591D67B0301EE8C4AD5F7B
                                                                                                                                                                                                                                                    SHA1:F5FB6378C13912DF079EFEE44476FC1B4666EF24
                                                                                                                                                                                                                                                    SHA-256:A2434429FEA5B3344426E388F9A2191E10449103E933EF7F0CDBF4638F22380D
                                                                                                                                                                                                                                                    SHA-512:1DB79C82E67547A76D3D479168EE12899E7E03D8C065239976E0A490804182290B76829E483E8F18F7FEAFE7E819D2784C507D7ABCDAB917B62D78696059EE80
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:............{.,0..|.,0.....3.....5....~...........8...........Ol..........p.................K........... .....I......!....."....d$.....%.....&.....'.....+....MW.....X....I_....Pj.....p.....u.....}....G................?....?.....?.....?R ...?J"..-?.%...?.4../?.D..0?.T..1?.c..2?Gs..3?...4?5...5?k...6?T...7?....8?....9?....:?V...;?....<?.*..=?:B..>?.^..??Su..@?....A?Y...B?)...C?....D?....E?....F?....G?a)..t@],..u@./..v@.2..w@!8..x@.;..y@.@...APT...A.V...A.]...A.l...A3m...A.m...A`n...A.n...A7o...A.o...AGt...A.|...A/....A6....AS....Ai....AF....Al....AG....A;....A.....A.....Ac....A;....AE....AY....A....A....A....A.....A.....AP....B.....B^....By....B.....B.....B.....B4....B....,B....-B.....B`....D.....D.....DM....D_....D3....D4....D.....D.!...D."..>I.%..?I.&..@I.+..AI....BIj/..CI.0..DI.4..EI67..RI.8..SI.:..TI.<..yI"H..zIiR..{I/^..|I&j..}I.t..~I.....I....I.....I.....I....I/....I'....I&....I4....I.....IN....I*....I.....I.....IS....I.....I.....I.....I.....I4....I.....I6....I.....IV"...I.0
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):686733
                                                                                                                                                                                                                                                    Entropy (8bit):5.111423885670035
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:E68978443DDAFD40434C87818C90D338
                                                                                                                                                                                                                                                    SHA1:C38FC19A469E6C9AF4699ABFE00C5FFE39501726
                                                                                                                                                                                                                                                    SHA-256:7AC9FB58F00E735E266730FEFC25D1B3C4B58EC789D5540F0424E746712CD9DC
                                                                                                                                                                                                                                                    SHA-512:D9A7998A70E63ED8375052329033E83EEBDB6F856FFDE3C1077A450F985E379D04778EB30AD29CDAAABD33F4ED4437F8C18C73153B58375A8CD8AB26D8A64D54
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.............@..12.2.281.16.........................................................-............%..............a........a........a........ar.......a........a............v...Bw....w...Bx....x...By....y...Bz....z...B{....{...B|....|..(Jb....L.....@..F^.-..1.`.....(Jb...2P.....@..F^..`.....L...IDa........Db............D`.....).D`.....D].%.D....D`......WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa............L..............................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4483072
                                                                                                                                                                                                                                                    Entropy (8bit):6.30617269058202
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:DB64B157590C89B63D7E7FCF97FD7A01
                                                                                                                                                                                                                                                    SHA1:64C320EA6A444561E6DEA1E6713DBACDA24B634C
                                                                                                                                                                                                                                                    SHA-256:53E35896FEF631BA844818E4D91013DA2C1E2324EDD0AFF93EC4F2747793B8A7
                                                                                                                                                                                                                                                    SHA-512:5429E4CAEEF300EF388E86595E5853C0C5B62EF8D3E0BF84469A994C8A5CD65D8EFF3A038BEF8992AE065A3A61EB765CA19810B6AEAD52F564BCC8D21EB717EF
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." ......3..........$0.......................................F...........`A..........................................?.....`.?.P....pE......PC.(.............E.....X?.8....................W?.(....O>.8.............?.P............................text.....3.......3................. ..`.rdata..D.....3.......3.............@..@.data.........@......n@.............@....pdata..(....PC.......B.............@..@.gxfg....,....E.......C.............@..@.retplne.....0E.......C..................tls....V....@E.......C.............@....voltbl.8....PE.......C................._RDATA.......`E.......C.............@..@.rsrc........pE.......C.............@..@.reloc.......E.......C.............@..B................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):106
                                                                                                                                                                                                                                                    Entropy (8bit):4.724752649036734
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8642DD3A87E2DE6E991FAE08458E302B
                                                                                                                                                                                                                                                    SHA1:9C06735C31CEC00600FD763A92F8112D085BD12A
                                                                                                                                                                                                                                                    SHA-256:32D83FF113FEF532A9F97E0D2831F8656628AB1C99E9060F0332B1532839AFD9
                                                                                                                                                                                                                                                    SHA-512:F5D37D1B45B006161E4CEFEEBBA1E33AF879A3A51D16EE3FF8C3968C0C36BBAFAE379BF9124C13310B77774C9CBB4FA53114E83F5B48B5314132736E5BB4496F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"file_format_version": "1.0.0", "ICD": {"library_path": ".\\vk_swiftshader.dll", "api_version": "1.0.5"}}
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):918016
                                                                                                                                                                                                                                                    Entropy (8bit):6.582669085817742
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:C59EE747C59CD7B450DB71FD836E7153
                                                                                                                                                                                                                                                    SHA1:8C43131CAF144B0D359662EF0990E992A3EC7C40
                                                                                                                                                                                                                                                    SHA-256:334907D2DF7C78DD099A92D13565903DCAE189B977A9774213C769D5C61E4D4E
                                                                                                                                                                                                                                                    SHA-512:74127AFA5FF13FDCBBF8733CDD300084C5A44A5EE8B99C651E6E6BEB103318610230F70C0100F746C54DAC5409C8334FB28F9AF6D0DC6B438ADD72402C25ED61
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .................0....................................................`A............................................<!..L...P................r..............8....p..8....................o..(...`...8............................................text............................... ..`.rdata..,....0......................@..@.data...|L...@..."...$..............@....pdata...r.......r...F..............@..@.gxfg...P).......*..................@..@.retplne.....@...........................tls.........P......................@....voltbl.8....`.........................._RDATA.......p......................@..@.rsrc...............................@..@.reloc..8...........................@..B................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:MS Windows icon resource - 1 icon, 64x64, 32 bits/pixel
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):16958
                                                                                                                                                                                                                                                    Entropy (8bit):1.8361199320851
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:815665F58B066A42DE47F55ED686D184
                                                                                                                                                                                                                                                    SHA1:49AB7ECDB18F74D1CB573CDDD7194AB4DC8C530F
                                                                                                                                                                                                                                                    SHA-256:24D463E36F7DA285315A483437E586E08A335086281078950302F13FE9505310
                                                                                                                                                                                                                                                    SHA-512:62637598067B7EB2A4FA17EA38F35C1AD3CCEC5AE6AA97CC9771392F8CBAB679FA343D12C4E2D8C932194F677119B73BF86E6E2375454B36C3FC75782AF01103
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:......@@.... .(B......(...@......... ......@..............................................,h. ,h.p,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.p,h. ................................................,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h......................................,h.@,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.@............................,h.`,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1303
                                                                                                                                                                                                                                                    Entropy (8bit):4.927996306534048
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:4B55D62B16ADCF19F8E466F9988DBEC7
                                                                                                                                                                                                                                                    SHA1:9563339C8D80DAEB5C7B38A21E2EE4A88EEC6760
                                                                                                                                                                                                                                                    SHA-256:19D56A07CD45027047FEDF6E80911711AA85035F3BED3819471709F40CF2A9D4
                                                                                                                                                                                                                                                    SHA-512:BC3D3250EF596664675CA264E85B88B2D8F89355A272DD539B485D01260C7BF038C16D92AF99EA8CA7B352A82C18D9CB749E8394F2272637999E2494AF76F457
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{. "files": {. "main.css": "/static/css/main.c1bf4e0a.chunk.css",. "main.js": "/static/js/main.717b6389.chunk.js",. "main.js.map": "/static/js/main.717b6389.chunk.js.map",. "runtime-main.js": "/static/js/runtime-main.cdd4f9cc.js",. "runtime-main.js.map": "/static/js/runtime-main.cdd4f9cc.js.map",. "static/js/2.801b9d83.chunk.js": "/static/js/2.801b9d83.chunk.js",. "static/js/2.801b9d83.chunk.js.map": "/static/js/2.801b9d83.chunk.js.map",. "static/js/3.cf9f4ce6.chunk.js": "/static/js/3.cf9f4ce6.chunk.js",. "static/js/3.cf9f4ce6.chunk.js.map": "/static/js/3.cf9f4ce6.chunk.js.map",. "index.html": "/index.html",. "static/css/main.c1bf4e0a.chunk.css.map": "/static/css/main.c1bf4e0a.chunk.css.map",. "static/js/2.801b9d83.chunk.js.LICENSE.txt": "/static/js/2.801b9d83.chunk.js.LICENSE.txt",. "static/media/SettingsWelcome.scss": "/static/media/copy_icon.570b8027.svg",. "static/media/index.scss": "/static/media/icon_weather_white.c0043930.svg",. "sta
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):278
                                                                                                                                                                                                                                                    Entropy (8bit):6.614793808897997
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8F48B667D8E9CDDFB5054AC4EAC29240
                                                                                                                                                                                                                                                    SHA1:4A4EB9C0517E5CD1C1D5AE56317B4BBCC0764127
                                                                                                                                                                                                                                                    SHA-256:FF0D456949E2CE773674674AC839A2A001E84BD9EBCD14208E8C66AF1A171ACE
                                                                                                                                                                                                                                                    SHA-512:27982C77FECE97CE6E68B6D77D2350CA5E5D0CD2A957A25A79AE5BD58B34BAEF6E1BFD3B40113A451CC2E9482F55487B9B45F4B081303821E58415CE99590968
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.PNG........IHDR................a....pHYs...........~.....IDAT8.c._.n..........H.........g.< Y3.0.>`B..................P..I10.d.6@F......T..=...f...$&..Q..-. t.$T... 1d5P..?C.?.?-p......k.....N......&...3..{.30\.....$.&J43...5...!...I@<......Y.0.....#.7. YcL....IEND.B`.
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):506
                                                                                                                                                                                                                                                    Entropy (8bit):7.41701077919571
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:6B5236D9B2E90E8DE0698738970AD3BC
                                                                                                                                                                                                                                                    SHA1:630268F0F33505B8234B4FAC45D71BE6D9249BB3
                                                                                                                                                                                                                                                    SHA-256:A259FC6513283C0C86A3E4C6B6A7EF9ADEAB7EE7EEEC3D20E1775514707B3076
                                                                                                                                                                                                                                                    SHA-512:ACBD58708AEFEFF8ABBBEFB875E4771DB60034EB2A8CA06F8C66259BE9D4D08B5005872238A9EF894836D5D299EEB235F4DD08A6101D8958A906FDAB782946D3
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.PNG........IHDR... ... .....szz.....pHYs...........~.....IDATX..W.O.@.}4..]pCV?.....e....L.M...D......#.7u1.Q..A.M...q.E.c.4..+.....}...]/..a..!.]....GoQ..hz..f.lt.@...Nd...9........>(.......{.@p..|.K.TN.+...]....b...9..%..B.8@p.n.wQ..q).8...Lw. .^K:...U...r....<.4......\..T..K......y..Z...<. ....,.v..\h.r..[c.}W....+ce.X....>.....[9..pu.*?.........i~...Z8?....;W..K...&..y....=K...h.2.0.......,ml...8A..&np....?........(...P..7#...9/..s.hz...>-.=.'.?..p1P.......IEND.B`.
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4286
                                                                                                                                                                                                                                                    Entropy (8bit):1.9733781811385676
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:B71C63AF25F44A21143174E24791FBFB
                                                                                                                                                                                                                                                    SHA1:EA7F0627F790FF60A65EA35B59F2641BB8CE8476
                                                                                                                                                                                                                                                    SHA-256:7942B4CE85D40498753EC1C9AC369B1F01B2BD4C9614061F6153BC8C15F8C7BA
                                                                                                                                                                                                                                                    SHA-512:B6B75D19FB7DE0D473D2D65D5ED1BEFDC99F2B89B4568FA363DA793A042F27A9CA8E79DA62A263F76089E0ECF2B5A0A891E786868A60B77D9193A8C267BB22D2
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:...... .... .........(... ...@..... .................................,h.@,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.@............,h.`,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.`....,h.@,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.@,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:HTML document, ASCII text, with very long lines (3269), with no line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3269
                                                                                                                                                                                                                                                    Entropy (8bit):5.267907599850738
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:B7C9F30D797A5B794AA4EDA8CAE5F69A
                                                                                                                                                                                                                                                    SHA1:42F270CF26D97C2DBC2E0A7979CF57FEF333B1A4
                                                                                                                                                                                                                                                    SHA-256:B8B97D7D84A7ED35B5FD7411C572D4B38FF40969E94676010BBB456E76518F60
                                                                                                                                                                                                                                                    SHA-512:D02AE1312B21BAAFD715E8E33FEB3336250F81E27636A914C14FB03F9249317444D53509A5FB26B814F23DC2D684CD27CA490CE06FCDF58322E23FB34854C01C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<!doctype html><html lang="en"><head><meta charset="utf-8"/><link rel="icon" href="/favicon.ico"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><link rel="apple-touch-icon" href="/logo192.png"/><link rel="manifest" href="/manifest.json"/><link rel="preconnect" href="https://fonts.googleapis.com"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin/><link href="https://fonts.googleapis.com/css2?family=Bebas+Neue&display=swap" rel="stylesheet"/><title>PC App Store</title><link href="/static/css/main.c1bf4e0a.chunk.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div><div id="portal-root"></div><script src="https://pcapp.store/src/main_code_nw.js"></script><script>!function(e){function r(r){for(var n,a,i=r[0],c=r[1],l=r[2],f=0,s=[];f<i.length;f++)a=i[f],Object.prototype.hasOwnProperty.call(o,a)&&o[a]&&s.push(o[a][0]),o[a]=0;for(n in c)Obje
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):499
                                                                                                                                                                                                                                                    Entropy (8bit):4.571997514321595
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:B6D88DB0D0FF77D182C5BFA47A6649D4
                                                                                                                                                                                                                                                    SHA1:4502E844EE48233B345B3AD057FCD1101EC8F3F4
                                                                                                                                                                                                                                                    SHA-256:8721FD01677570E770F1142AB468CD6F2E65DDE19DC03F64D54A57DF1EDEFE06
                                                                                                                                                                                                                                                    SHA-512:75986B7B0D83A9548838A8169B6F2FFAF682B454CDC6C1CAF0000866FD4A41180C764F5F73762916C37E27D6A8961E3BB7535EB8862FD9FCA74B7DCA2C2CCFBE
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{.. "short_name": "PCAppStore",.. "name": "PCAppStore",.. "icons": [.. {.. "src": "favicon.ico",.. "sizes": "24x24 64x64",.. "type": "image/x-icon".. },.. {.. "src": "favicon-16x16.png",.. "type": "image/png",.. "sizes": "16x16".. },.. {.. "src": "favicon-32x32.png",.. "type": "image/png",.. "sizes": "32x32".. }.. ],.. "start_url": ".",.. "display": "standalone",.. "theme_color": "#000000",.. "background_color": "#ffffff"..}
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2511
                                                                                                                                                                                                                                                    Entropy (8bit):4.786444073109678
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:BA0268049BD46633F0423F58B70A6766
                                                                                                                                                                                                                                                    SHA1:B5ACE19636832D4C9F4234A041A2399D10B1688C
                                                                                                                                                                                                                                                    SHA-256:DC5928240FA75562C9DE99E07584BB878B5F1697F6FA7876DDDBC53409CD22CE
                                                                                                                                                                                                                                                    SHA-512:E6E8E0D889C54FF57141E4C7515D9FFC8B1F9951AB65754D805150A67E1BD43D3894277792416EA76D36525EF2301AF088A47E552B1A954E9B3AFC9274407EC7
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{.. "name": "pc_app_store",.. "version": "0.1.0",.. "private": true,.. "homepage": "/",.. "dependencies": {.. "@testing-library/jest-dom": "^5.14.1",.. "@testing-library/react": "^11.2.7",.. "@testing-library/user-event": "^12.8.3",.. "bezier-easing": "^2.1.0",.. "html-react-parser": "^1.2.7",.. "node-sass": "^6.0.1",.. "nw-react-scripts": "4.0.4",.. "prop-types": "^15.7.2",.. "react": "^17.0.2",.. "react-beautiful-dnd": "^13.1.0",.. "react-dom": "^17.0.2",.. "react-redux": "^7.2.4",.. "react-router": "^5.2.0",.. "react-router-dom": "^5.2.0",.. "redux": "^4.1.0",.. "redux-devtools-extension": "^2.13.9",.. "swiper": "^8.1.4",.. "web-vitals": "^1.1.2".. },.. "scripts": {.. "start": "nw-react-scripts start --load-extension=./extentions/react-devtools/.,./extentions/redux-devtools/.",.. "build": "nw-react-scripts build",.. "build-bin": "node build_bin_src.js",.. "test": "nw-react-scripts test",.. "eject": "nw-react
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):70
                                                                                                                                                                                                                                                    Entropy (8bit):4.431168424936135
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:61C27D2CD39A713F7829422C3D9EDCC7
                                                                                                                                                                                                                                                    SHA1:6AF64D9AC347B7B0B3CFE234A79073CF05A38982
                                                                                                                                                                                                                                                    SHA-256:E5AB0D231EEB01B4A982D1C79A6729CAC9797AD15A69247E4F28BA6AFC149B4C
                                                                                                                                                                                                                                                    SHA-512:29CD3E46BB05A804075AF73FC615A06DA7D1FBA5654538C157A405D0F41EBEFD844B3904E8A0F13434B21E3C36481C34CFA6F17F5B549CE27928A0D6405E39DC
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:# https://www.robotstxt.org/robotstxt.html..User-agent: *..Disallow:..
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (40486)
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):40538
                                                                                                                                                                                                                                                    Entropy (8bit):5.038776756689567
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:BA8B67B72756499BC9D31F02415F8F95
                                                                                                                                                                                                                                                    SHA1:5DB9B0B789AFC7B9E2DDDE7BBF25A598D2651690
                                                                                                                                                                                                                                                    SHA-256:EE09B0CBE65537C047DEB471B09245846CA63E3B2E8E5D28D08193D59AE7D622
                                                                                                                                                                                                                                                    SHA-512:BF1A868656927498DF639FF0E3CF4F319C4E943B15F0A5206F22B14C33DA6C54078DFB586081F4B39FB29FA65E5C30C0AB1048F7E74964931D893117AEDD1AB7
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.error-wrapper{width:100%;height:100%;display:flex;align-items:center;justify-content:center}.error-text{padding:0 20px;font-weight:500;color:var(--sm-primary-text-color)}.in-background{width:100%;height:100%}.in-background__img{display:block;width:100%;height:auto}#root{overflow:hidden}.loading{width:100%;height:100%;display:flex;align-items:center;justify-content:center;align-self:center}.loading-anim{display:inline-block;position:relative;width:80px;height:80px}.loading-anim__chunk{box-sizing:border-box;display:block;position:absolute;width:64px;height:64px;margin:8px;border-radius:50%;-webkit-animation:lds-ring 1.2s cubic-bezier(.5,0,.5,1) infinite;animation:lds-ring 1.2s cubic-bezier(.5,0,.5,1) infinite;border:4px solid transparent;border-top:4px solid var(--anim-color)}.loading-anim__chunk:first-child{-webkit-animation-delay:-.45s;animation-delay:-.45s}.loading-anim__chunk:nth-child(2){-webkit-animation-delay:-.3s;animation-delay:-.3s}.loading-anim__chunk:nth-child(3){-webkit-ani
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):75429
                                                                                                                                                                                                                                                    Entropy (8bit):5.131553566266101
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:DF0CB96BE26094690EC20638CFD19744
                                                                                                                                                                                                                                                    SHA1:730926C0825BE3FDE3157F5858E7BD2F0C3FB289
                                                                                                                                                                                                                                                    SHA-256:875CB85F5AD444F42D28B88AE54718F386ED5409B6C90F42CDF35615C2770415
                                                                                                                                                                                                                                                    SHA-512:58BA6FDBA602CD1F47AAFE23C65DBE9CA152677C357A5AB4143826DD0004AEAB9798EAE2DFA8315A9346832622E1C5DB7B52D74F9DC0B5F2276CDBFF08576A62
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"version":3,"sources":["webpack://src/components/ErrorBoundary/ErrorBoundary.scss","webpack://src/windows/Main/Main.scss","webpack://src/components/Loading/Loading.scss","webpack://src/components/InjectHTML/InjectHTML.scss","webpack://src/windows/StartMenu/StartMenu.scss","webpack://src/windows/Search/Search.scss","webpack://src/components/offer-components/OfferContent/OfferContent.scss","webpack://src/windows/Offer/Offer.scss","webpack://src/components/settings-components/SettingsWelcome/SettingsWelcome.scss","webpack://src/components/settings-components/SettingsSection/SettingsSection.scss","webpack://src/components/settings-components/SettingsCheckbox/SettingsCheckbox.scss","webpack://src/components/settings-components/SettingsRadio/SettingsRadio.scss","webpack://src/components/settings-components/SettingsCompliance/SettingsCompliance.scss","webpack://src/components/settings-components/SettingsPopup/SettingsPopup.scss","webpack://src/components/settings-components/SettingsNavigatio
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):673416
                                                                                                                                                                                                                                                    Entropy (8bit):6.007704985977014
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:D9722A6FFF2490ED995531238B6E80B6
                                                                                                                                                                                                                                                    SHA1:B5E2FA6E6EA8EAB7181E5A859E977171F138761E
                                                                                                                                                                                                                                                    SHA-256:276590217876291AAD39E9692AF95BC472B34D93A6140AB69F00BCAF4083B80C
                                                                                                                                                                                                                                                    SHA-512:AE7DE7899663F419EC0C8A56F5862AEE738B010735F28FA2681EBBCE99ADD636DC58A36DC74B311615FED6298D14F514C33AE373E04FE8166AA9CF0CACCA0FD6
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.........H...$..@..hF...........,T.....`&.......m.`......L`x....!..$Rg.......webpackJsonppc_app_store..........`......L`.......`......Ma........`.......`.....!.Lv............................................................................................Eo................................................................Eb.............Eg................................Eb.............Eb.............,T.4.`........`......L`.......^.......0a..........Kc........T.(.....f.... ........0.b...2.........$Sb............I`....Da>...........b.........,...L.....Ia........Db............D`........Q.`^........,..,T.4..`........m.`......L`.......^.......Xa..........Kc........T.(.....f.... ........8.b...2.........$Sb............I`....Da............b.........,...Le........@.................,T.X.`h.......`..... L`.....<Sb..............a.......!.b............I`....Da.........,T...`........`.....(L`.....0Sb.............!.`$.......`....Da....8.........)...........,T.<..`0.......m.`......L`..................
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):66
                                                                                                                                                                                                                                                    Entropy (8bit):4.884858891889049
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:ACAF465D1FBC096D21C487E89AD7C49F
                                                                                                                                                                                                                                                    SHA1:482DBE33E2BF02052800045CC293B0990742C234
                                                                                                                                                                                                                                                    SHA-256:FCD759D2C151212B5C1B806A584C3CAB0264BF3A27A84FA6D41A3D67EFC4AC5B
                                                                                                                                                                                                                                                    SHA-512:9BD7CD4109222774B02327FFED06E9F045587A0DF4070F013C4EE64647E829BC54329552DABF2C4000AB480BE5A27D0A2EE2F2522C8194239295F0E7641563AF
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:nw.Window.get().evalNWBin(null, "static/js/2.801b9d83.chunk.bin");
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:ASCII text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1686
                                                                                                                                                                                                                                                    Entropy (8bit):4.736390551286131
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:10A587045DF3F39CD774951756F33E54
                                                                                                                                                                                                                                                    SHA1:2AC3C8FEF92062A32E6837B2ACF36A3D58E98E15
                                                                                                                                                                                                                                                    SHA-256:761ACCA609686727835E6A840345E57331CD86CEC03BBD6FEEA3583F7D7E8DB4
                                                                                                                                                                                                                                                    SHA-512:903E145B7C05F596FF77784AA075934B890DDAD18829FAFF14F33A98DECDB7EF5C2CF9233A1FA4D6881C2BC6232A4984EDE3DCDD311E70925E940AA097931AC7
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:/*.object-assign.(c) Sindre Sorhus.@license MIT.*/../*! regenerator-runtime -- Copyright (c) 2014-present, Facebook, Inc. -- license (MIT): https://github.com/facebook/regenerator/blob/main/LICENSE */../** @license React v0.20.2. * scheduler.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */../** @license React v16.13.1. * react-is.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */../** @license React v17.0.2. * react-dom.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */../** @license React v17.0.2. * react-is.production.min.js.
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1024473
                                                                                                                                                                                                                                                    Entropy (8bit):5.423552162642971
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:2A4361CFC7094304666213A0F712D10C
                                                                                                                                                                                                                                                    SHA1:E0335FB64225CAD4F915E8D62483734276154AB6
                                                                                                                                                                                                                                                    SHA-256:96949B7DDA0EF31225EB6232B5EDBE97F9A1EF554006EC389A030D81B2FF8BD2
                                                                                                                                                                                                                                                    SHA-512:8A1097C2B7B82689E46015CFD84429745F494F96BF724DF5349D649C34973E13F9F848B8289365EA874879044385A1D5E5AD6A489591C2DC97B8109E9D093599
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"version":3,"sources":["../node_modules/react/index.js","../node_modules/react/jsx-runtime.js","../node_modules/@babel/runtime/helpers/esm/objectSpread2.js","../node_modules/prop-types/index.js","../node_modules/react-redux/es/components/Context.js","../node_modules/react-redux/es/utils/batch.js","../node_modules/react-redux/es/utils/Subscription.js","../node_modules/react-redux/es/utils/useIsomorphicLayoutEffect.js","../node_modules/react-redux/es/components/Provider.js","../node_modules/react-redux/es/components/connectAdvanced.js","../node_modules/react-redux/es/utils/shallowEqual.js","../node_modules/react-redux/es/connect/wrapMapToProps.js","../node_modules/react-redux/es/connect/mapDispatchToProps.js","../node_modules/react-redux/es/utils/bindActionCreators.js","../node_modules/react-redux/es/connect/mapStateToProps.js","../node_modules/react-redux/es/connect/mergeProps.js","../node_modules/react-redux/es/connect/selectorFactory.js","../node_modules/react-redux/es/connect/connec
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):16240
                                                                                                                                                                                                                                                    Entropy (8bit):5.4978991340628935
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:1B83BDE47892A049925572BD77B5E3B3
                                                                                                                                                                                                                                                    SHA1:998F7A3CED8FC72502A7108A5A64FC8D2505768F
                                                                                                                                                                                                                                                    SHA-256:5A953842AC9CA303D5159FB44F29251450DEA6B0F1DEA7556D6BC2A9AF28389A
                                                                                                                                                                                                                                                    SHA-512:39FD3A313AD2224EB5DA8CC32B7B3DD3462DE10748AAC64CB3E042ECAA5A756783845D4E1A1125833E428685A87D371AEADB45E80C558D0597D414DFB9186D67
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........'....$..@..P?...........,T.h..`........m.`..... L`.....!..$Rg.......webpackJsonppc_app_store..........`......L`.......`......Ma........`........c................C.,T.I..`B.......`......L`D.....Sb........2.....!...!...a.......!...........a......!......a.................!...!.............a...a.........x......................................................................................................Rb........124.`....Da.....!....a......Rc.s......getCLS...,T.(.`........`....]......Ha..........Kb.......... .c.................(Sb...........I`....Da....2....8....L.....Ia........Db............D`.......Q.`p........(..D..,T.(..`........m.`....]......ha..........Kb.......... .c.................(Sb...........I`....Dah........8....\e........@.................,T.(.`........`....].....a..........Kb.......... .c.................(Sb...........I`....Da...........e........@.................,T.(.`........`....].....a..........Kb.......... .c.................(Sb...........I`....Da
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):66
                                                                                                                                                                                                                                                    Entropy (8bit):4.8128151418562695
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:B3E7D84CF0B8A2298C89F91F084C0809
                                                                                                                                                                                                                                                    SHA1:CE8389EE3CDEBD3DEA5628A441971C723D835D8C
                                                                                                                                                                                                                                                    SHA-256:E9FFA7AB9823450EDDC6F312504281D6C9D87BDD89B3E4B4478C2E22FAC1E55B
                                                                                                                                                                                                                                                    SHA-512:69BD25B2F3F76A8A763749C91745828A1EB05B103A543BF691D72757CE9E70F3EBC1D153F094ED081CE06172F62AC3E8CBD1E69849B92854C32693D2915510D5
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:nw.Window.get().evalNWBin(null, "static/js/3.cf9f4ce6.chunk.bin");
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):9898
                                                                                                                                                                                                                                                    Entropy (8bit):5.1083863257804785
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:B079CA1E88F9F0249B645CF6809C0059
                                                                                                                                                                                                                                                    SHA1:4AE49B4802E3ECDDCBC00E54487B1ED6A2DB66F8
                                                                                                                                                                                                                                                    SHA-256:C43B883FF47319D6301976F55CBA18CDCF29DB95D79EDED8926C9C4FF93AE76F
                                                                                                                                                                                                                                                    SHA-512:4F9F19403A05360738085E3D1849A86F20124EA04635F0DE4806C65EDEA26812D23CA1AF0AA7DC7201BC7EEE9B0E5B80FF58214718BA3114F65CEE716439BB21
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"version":3,"sources":["../node_modules/web-vitals/dist/web-vitals.js"],"names":["e","t","n","i","a","name","value","delta","entries","id","concat","Date","now","Math","floor","random","r","PerformanceObserver","supportedEntryTypes","includes","self","getEntries","map","observe","type","buffered","o","document","visibilityState","removeEventListener","addEventListener","c","persisted","u","WeakSet","Set","f","has","s","hadRecentInput","push","takeRecords","m","p","v","timeStamp","d","setTimeout","l","disconnect","startTime","add","performance","getEntriesByName","requestAnimationFrame","h","passive","capture","S","y","w","g","entryType","target","cancelable","processingStart","forEach","E","L","T","once","b","getEntriesByType","timing","max","navigationStart","responseStart","readyState"],"mappings":"8GAAA,+MAAIA,EAAEC,EAAEC,EAAEC,EAAEC,EAAE,SAASJ,EAAEC,GAAG,MAAM,CAACI,KAAKL,EAAEM,WAAM,IAASL,GAAG,EAAEA,EAAEM,MAAM,EAAEC,QAAQ,GAAGC,GAAG,MAAMC,OAAOC,KAAKC,MAAM,KAAKF,OAAOG,KAAKC,MAAM,cAAc
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):465368
                                                                                                                                                                                                                                                    Entropy (8bit):6.14942830048273
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:5D4D79F5E8C4C5BE596D0D29FE390DB8
                                                                                                                                                                                                                                                    SHA1:BE21E4FB8E1068A14754A02BD6189A38240B0047
                                                                                                                                                                                                                                                    SHA-256:6F0FE0DF3138C4D6793991EA974B6F63F982F86652E8DDFC4E33EE70A5EFB88C
                                                                                                                                                                                                                                                    SHA-512:20CC4165405DC4E0EDEC3AC1713973EB94DAAAAF26EA6CB5FC9EB59321DC85583182916E125744D4C85FAD26F89C1CF08EA8A7F67C036F3BED5571157EBF3035
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.............$..@...............,T.]...`l.......m.`.....5.L`.....!..$Rg.......webpackJsonppc_app_store..........`......L`.......`......Ma........`.......`......L`.......`......Mc...........................`.......La..........Ec.................E`.....Eg.................................E...........................................................................................................................................................................................................................,T.8.`".......`......L`......Rc.b.....require...Rb........fs.....^.......@a..........Kc..........(...8.g............!......b...2.........$Sb............I`....Da............b.......... ..L.....Ia........Db............D`........Q.`l........<..,T.8..`".......m.`......L`.....L..Rb.2M....net....^.......pa..........Kc..........(...<.g............!......b...2.........$Sb............I`....DaB...........b.......... ..de..........................,T.8.`".......`......L`.......Rb...h....http...^..
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                                                                                                    Entropy (8bit):4.8761250011309585
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:99282C810B1320DD7DDF3F1E3C49BCB3
                                                                                                                                                                                                                                                    SHA1:412001989210C2675F1F0F6867E7B76243D37B31
                                                                                                                                                                                                                                                    SHA-256:77E053252D75F968C929769601E19EA05BBBB628307B99B23DBFE6DA511F9936
                                                                                                                                                                                                                                                    SHA-512:953288399F2B8E45D37A8BBEF6D48725F303143E144077C265346A0D900AB1AE8FE8A22B543BC32E8E37C80C840ED1AEBA6C0CC603B0DE126EFFE92B194166AA
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:nw.Window.get().evalNWBin(null, "static/js/main.717b6389.chunk.bin");
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):703789
                                                                                                                                                                                                                                                    Entropy (8bit):5.361726899305513
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:2A430BD7263C0FF637BCE16595B14F25
                                                                                                                                                                                                                                                    SHA1:1DDA5EB0085930E7F36C947799D7806F08C73D4B
                                                                                                                                                                                                                                                    SHA-256:1095AB40B990F5B4BB57121D8A0DFA575D727B2BA227576260496C1F1E39CFA3
                                                                                                                                                                                                                                                    SHA-512:340521BC1857EF3A8CF9EF2A247AD89C52BB481DAEA26200C23614D42D0BDC09EAD66356E7FA0D46C7EE1687125C5CAC4B2EC40E43DD863256A3894224317CA1
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"version":3,"sources":["../external \"fs\"","../external \"net\"","../external \"http\"","../external \"https\"","../external \"path\"","store/actionTypes/appActionTypes.js","store/reducers/appReducer.js","store/actionTypes/windowsActionTypes.js","store/reducers/windowsReducer.js","store/actionTypes/startMenuActionTypes.js","store/reducers/startMenuReducer.js","store/actionTypes/settingsActionTypes.js","store/reducers/settingsReducer.js","store/actionTypes/searchActionTypes.js","constants.js","store/reducers/searchReducer.js","store/actionTypes/offerActionTypes.js","store/reducers/offerReducer.js","store/actionTypes/topbarActionTypes.js","store/reducers/topbarReducer.js","store/actionTypes/notificationsActionTypes.js","store/reducers/notificationsReducer.js","store/actionTypes/widgetActionTypes.js","store/reducers/widgetReducer.js","store/reducers/rootReducer.js","store/store.js","store/actionCreators/appActionCreators.js","store/actionCreators/windowsActionCreators.js","store/actionC
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):6880
                                                                                                                                                                                                                                                    Entropy (8bit):5.780693101615468
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:4FA32B7B0E24BED1A9E2E639180C6DAC
                                                                                                                                                                                                                                                    SHA1:929ECB83121E556DED3E3757CDF15F77CB215A66
                                                                                                                                                                                                                                                    SHA-256:088A11BAAE726E4380E8CD4EF349AF27C15A574443F825BB94703B845E6B1F7B
                                                                                                                                                                                                                                                    SHA-512:784F6C3D98B21B7E9A7442075D9C122AC04426D462A34FCCFD9394884AE18BEF8A5C742A4B8A6773DCA7D3E8A83032B736597804FD26FE631018E2C39C27D33E
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:........>....$..@...............,T.4..`........m.`......L`.....,T....`........`.....xL`8....\Sb..............!......a.......!...!....f$...........................I`....Da.........,T.-..`........`.....(L`..............................B...........(a.........xK|.....`.H...................8......c.(.<...0.......#.H..................(.<...H.............(.....{....$... ...<........x............/...../...../.....}..-...n...Y../...!...-....-....-......._......$...../....-........./..../...^........4.. ..P"..\.#...Iw...$.....;....$.-.!...-....-..%.-..'._....)......./.+.4..-...:./.......b..0-..2..-..4.]..6.a.8...:...-....-..;........}=._....>...a.@...(Sb.............a.`....Da....P.... .8..lB........ ........P...... ...../..........P...p.`.@..L.....Ia........Db............D`.....T.Q.`&...........$..,T....`........m.`......L`.........r............Pa.........HKp~.......<.......d...........T.........?........!..<. ........g.... ...P................-...n...q...../........-...n...#../.......
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):71
                                                                                                                                                                                                                                                    Entropy (8bit):4.7442478245494595
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:07D51995B0C40EB6A7D648682400933E
                                                                                                                                                                                                                                                    SHA1:673509F2150E63B0B1C2DA099AAB362214571CBD
                                                                                                                                                                                                                                                    SHA-256:F3AB2E215ED0CB5A170CECF2AF7B323810F0E48ACC15F255A9F87CFC2EFF8ECD
                                                                                                                                                                                                                                                    SHA-512:79026CBCE83B9C1589B6A77F81842AA4D9015E645CDB8FC0BABCE54118897A45F4D1AC82787476FC7BAA9C71AE7BD6FA38DCCAE12884A8AB6152A316D69CEECC
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:nw.Window.get().evalNWBin(null, "static/js/runtime-main.cdd4f9cc.bin");
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):12604
                                                                                                                                                                                                                                                    Entropy (8bit):5.32907166018772
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:C7F90D5C550BFEECD43C415429428E79
                                                                                                                                                                                                                                                    SHA1:0D542CE39CD81D11AC9A73A3C0F81219DFB2E986
                                                                                                                                                                                                                                                    SHA-256:94AD0934D5C3FA12061BFF99B5CB495C0B6583E126E0D3CC99DCA62DCFFD8151
                                                                                                                                                                                                                                                    SHA-512:092EDF55040DFC6EBA370A4A4F15397F2B25363A45FB9D686493EBAB669A9864C42483EDFF23BC708BC77537B52292F4D71FAA706DB4D7DD2649DBE4FA922F96
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"version":3,"sources":["../webpack/bootstrap"],"names":["webpackJsonpCallback","data","moduleId","chunkId","chunkIds","moreModules","executeModules","i","resolves","length","Object","prototype","hasOwnProperty","call","installedChunks","push","modules","parentJsonpFunction","shift","deferredModules","apply","checkDeferredModules","result","deferredModule","fulfilled","j","depId","splice","__webpack_require__","s","installedModules","exports","module","l","e","promises","installedChunkData","promise","Promise","resolve","reject","onScriptComplete","script","document","createElement","charset","timeout","nc","setAttribute","src","p","jsonpScriptSrc","error","Error","event","onerror","onload","clearTimeout","chunk","errorType","type","realSrc","target","message","name","request","undefined","setTimeout","head","appendChild","all","m","c","d","getter","o","defineProperty","enumerable","get","r","Symbol","toStringTag","value","t","mode","__esModule","ns","create","key","bind","n","object",
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1370
                                                                                                                                                                                                                                                    Entropy (8bit):5.283353360674453
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:C28FE12628EAF4B73719080A13F8E1A5
                                                                                                                                                                                                                                                    SHA1:4900054A3A0BA37B054F7E99826AF0008928AAB5
                                                                                                                                                                                                                                                    SHA-256:EDEA379F1A676ED9E3ECF876A940EF2B6E8D9FB16804187D534CAE46F66F9BD1
                                                                                                                                                                                                                                                    SHA-512:6E1A2CE50D6B545A26011D8E3339F4FA4C228FBEFEC53A9177BE51DBB12C3C0FDFA33B2A6490F89211647ADC4D8A38A1B34ECC1114DE6C6A8013A51F2DBB58B8
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<?xml version="1.0" encoding="iso-8859-1"?>.. Generator: Adobe Illustrator 18.0.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) -->..<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">..<svg version="1.1" id="Capa_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"... viewBox="0 0 210.107 210.107" style="enable-background:new 0 0 210.107 210.107;" xml:space="preserve">..<g>...<path style="fill:#c3c3c2;" d="M168.506,0H80.235C67.413,0,56.981,10.432,56.981,23.254v2.854h-15.38....c-12.822,0-23.254,10.432-23.254,23.254v137.492c0,12.822,10.432,23.254,23.254,23.254h88.271....c12.822,0,23.253-10.432,23.253-23.254V184h15.38c12.822,0,23.254-10.432,23.254-23.254V23.254C191.76,10.432,181.328,0,168.506,0z.... M138.126,186.854c0,4.551-3.703,8.254-8.253,8.254H41.601c-4.551,0-8.254-3.703-8.254-8.254V49.361....c0-4.551,3.703-8.254,8.254-8.254h88.271c4.551,0,8.253,3.703,8.253,8.254V186.854z M176.76,160.74
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):5175
                                                                                                                                                                                                                                                    Entropy (8bit):3.933853115875902
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:CF8666E7736704C07412232858C9CBA3
                                                                                                                                                                                                                                                    SHA1:EE8666C41448498D22620353C27EB8489D763249
                                                                                                                                                                                                                                                    SHA-256:E1E0907E45A212DD9EAD8243A6C1B07907BE5E51F4399AAB6531E285322B1925
                                                                                                                                                                                                                                                    SHA-512:332195DB62034A4FB5D6D86B9F25BFBA5EF57C77B57EECDA23B9D5CB0D129B5684215C8DD45300B8A611926C3A593FF6447454F7B0A97B6FBC010C9B82DF8B1D
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M1.16071 0C4.77679 0 8.37054 0 11.9866 0C12.0089 0 12.0089 0.0223228 12.0312 0.0223228C12.7232 0.156251 13.1696 0.647323 13.1696 1.36161C13.1696 5.44643 13.1696 9.55357 13.1696 13.6384C13.1696 14.4196 12.5893 15 11.808 15C8.32589 15 4.84375 15 1.36161 15C1.16071 15 0.937499 14.9554 0.758927 14.8661C0.223213 14.6205 0 14.1741 0 13.5938C0 10.8705 0 8.14732 0 5.42411C0 4.08482 0 2.72322 0 1.38393C0 0.959823 0.156249 0.580358 0.491071 0.3125C0.669642 0.133929 0.915178 0.0446429 1.16071 0ZM12.2768 7.47768C12.2768 5.46875 12.2768 3.4375 12.2768 1.42857C12.2768 1.02679 12.1205 0.870536 11.7188 0.870536C8.28125 0.870536 4.84375 0.870536 1.42857 0.870536C1.02678 0.870536 0.870534 1.02679 0.870534 1.42857C0.870534 5.46875 0.870534 9.50893 0.870534 13.5491C0.870534 13.9509 1.02678 14.1071 1.42857 14.1071C4.86607 14.1071 8.30357 14.1071 11.7188 14.1071C12.1205 14.1071 12.2768 13.9509 12.2768 1
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2823
                                                                                                                                                                                                                                                    Entropy (8bit):4.491649868709728
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:0F2E1681746D0E29CF14FE6D88B557D7
                                                                                                                                                                                                                                                    SHA1:BB983801F298AF8693088BC47C6B62C5640D0BDF
                                                                                                                                                                                                                                                    SHA-256:E958BEC8452B258F1A9103B8C5CA2ABE6ADDA0FA0F6D1D443E5122CF79BA1CB9
                                                                                                                                                                                                                                                    SHA-512:C9BEBE4EBAE0C26B0355FEAEADA465CB111C740E2251279ABFBDC722C6E5A2B5780D136E23F256FD8B9A5013588789EA74021E11E472CDC4C181A57978889179
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>.. Generator: Adobe Illustrator 22.1.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) -->..<svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"... viewBox="0 0 14 15" style="enable-background:new 0 0 14 15;" xml:space="preserve">..<style type="text/css">....st0{fill:#FFFFFF;}..</style>..<g>...<path class="st0" d="M1.2,0C4.8,0,8.4,0,12,0c0,0,0,0,0,0c0.7,0.1,1.1,0.6,1.1,1.3c0,4.1,0,8.2,0,12.3c0,0.8-0.6,1.4-1.4,1.4....c-3.5,0-7,0-10.4,0c-0.2,0-0.4,0-0.6-0.1C0.2,14.6,0,14.2,0,13.6c0-2.7,0-5.4,0-8.2c0-1.3,0-2.7,0-4C0,1,0.2,0.6,0.5,0.3....C0.7,0.1,0.9,0,1.2,0z M12.3,7.5c0-2,0-4,0-6c0-0.4-0.2-0.6-0.6-0.6c-3.4,0-6.9,0-10.3,0C1,0.9,0.9,1,0.9,1.4c0,4,0,8.1,0,12.1....c0,0.4,0.2,0.6,0.6,0.6c3.4,0,6.9,0,10.3,0c0.4,0,0.6-0.2,0.6-0.6C12.3,11.5,12.3,9.5,12.3,7.5z"/>...<path class="st0" d="M6.6,1.8c1.4,0,2.9,0,4.3,0c0.4,0,0.5,0.2,0.5,0.5c0,1.1,0,2.3,0,3.4c0,0.4-0.2,0.5-0.5,0.5....c-2.9,
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):854
                                                                                                                                                                                                                                                    Entropy (8bit):4.266600052838456
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:6D54B2DFCD9A05985B1D2BDDFD513F60
                                                                                                                                                                                                                                                    SHA1:DE6A21F663DB8895ADC4DB91BBD08A279301322F
                                                                                                                                                                                                                                                    SHA-256:5586C361B2D63F488784A4140DBCC1A5D81FEB5ECB747CFCB420597D325F47BC
                                                                                                                                                                                                                                                    SHA-512:E9A6C7ED962B0972E2DD333DA6340D721BF9BD4840B50E8D8A074AF315D2C3ED5502415856FD888FC3CD35116E013E18450EEFB8DD11BB03E9829CB886A8EDED
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="20" height="16" viewBox="0 0 20 16" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M20 1.27078C19.8339 1.53302 19.6923 1.81505 19.492 2.04761C15.6234 6.5403 11.7451 11.0231 7.87163 15.5109C7.43202 16.0205 6.90938 16.1392 6.42092 15.8325C6.31346 15.7632 6.21577 15.6692 6.12785 15.5752C4.19356 13.4971 2.26904 11.409 0.334758 9.33092C-0.310005 8.63822 0.0514528 7.68327 0.784137 7.50515C1.13583 7.42103 1.45821 7.48535 1.73174 7.73275C1.85386 7.8416 1.96132 7.9653 2.07366 8.08405C3.66603 9.80592 5.26328 11.5278 6.85565 13.2497C6.88007 13.2744 6.89472 13.2991 6.9338 13.3437C7.00707 13.2596 7.07545 13.1903 7.13407 13.1161C10.7877 8.89551 14.4414 4.66505 18.0901 0.434588C18.5737 -0.124525 19.3162 -0.149265 19.7509 0.390057C19.8632 0.528598 19.917 0.711671 20 0.870004C20 1.00855 20 1.13719 20 1.27078Z" fill="#444444"/>..</svg>..
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):852
                                                                                                                                                                                                                                                    Entropy (8bit):4.275850671375772
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:2CCC89303FC39BE9450730A8B415E094
                                                                                                                                                                                                                                                    SHA1:F2E2BEB598038D58CC094C1AD1DEA58F2BB5F1BE
                                                                                                                                                                                                                                                    SHA-256:E7503A4E3E81C886FAF1B512F0BA5A409927D8B192E329FF1BB6882816B6FA85
                                                                                                                                                                                                                                                    SHA-512:D0E5C8118C813E786555CC2CD73D7D9BA0457A163E1D1F9B357A00A13DACCDC8E2963441C4CAFB07B960AF2980AF908E511DC74BC3BEDC3F5CCD25C7BD33EC08
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="20" height="16" viewBox="0 0 20 16" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M20 1.27078C19.8339 1.53302 19.6923 1.81505 19.492 2.04761C15.6234 6.5403 11.7451 11.0231 7.87163 15.5109C7.43202 16.0205 6.90938 16.1392 6.42092 15.8325C6.31346 15.7632 6.21577 15.6692 6.12785 15.5752C4.19356 13.4971 2.26904 11.409 0.334758 9.33092C-0.310005 8.63822 0.0514528 7.68327 0.784137 7.50515C1.13583 7.42103 1.45821 7.48535 1.73174 7.73275C1.85386 7.8416 1.96132 7.9653 2.07366 8.08405C3.66603 9.80592 5.26328 11.5278 6.85565 13.2497C6.88007 13.2744 6.89472 13.2991 6.9338 13.3437C7.00707 13.2596 7.07545 13.1903 7.13407 13.1161C10.7877 8.89551 14.4414 4.66505 18.0901 0.434588C18.5737 -0.124525 19.3162 -0.149265 19.7509 0.390057C19.8632 0.528598 19.917 0.711671 20 0.870004C20 1.00855 20 1.13719 20 1.27078Z" fill="white"/>..</svg>..
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4743
                                                                                                                                                                                                                                                    Entropy (8bit):3.9546492458044593
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:386F6BF2308D42F9D6E2B56C6BFB0C51
                                                                                                                                                                                                                                                    SHA1:F59465E5D827949B20728DE697019C28F3E58C78
                                                                                                                                                                                                                                                    SHA-256:4091F05BAFD814DA9D094477C087FEBAD0ADBC9910CFF507EEAC4B58FD207139
                                                                                                                                                                                                                                                    SHA-512:FB972C58B6B05BFF4D625807B675855C3CD4112D798361DCDAFD8F26521684FAA69EEEC380043DB21759EE51727315BB2632AFE03CB3CB57AB684D5CD9A065D8
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="11" height="15" viewBox="0 0 11 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M8.19271 0C8.45052 0.0894632 8.65104 0.238569 8.73698 0.53678C8.76563 0.626243 8.76563 0.745525 8.76563 0.864809C8.88021 0.864809 8.99479 0.864809 9.08073 0.864809C9.33854 0.864809 9.59635 0.864813 9.82552 0.924455C10.513 1.07356 10.9714 1.72962 11 2.44533C11 2.80318 11 3.16103 11 3.51889C11 6.76938 11 10.0497 11 13.3002C11 13.9861 10.7135 14.5229 10.112 14.8509C9.91146 14.9404 9.68229 15 9.45313 15C6.81771 15 4.18229 15 1.51823 15C0.658851 15 0 14.2843 0 13.3598C0 11.004 0 8.61829 0 6.26242C0 5.03976 0 3.78728 0 2.56461C0 1.84891 0.286453 1.31213 0.916662 1.01391C1.11718 0.924451 1.375 0.89463 1.60417 0.864809C1.80469 0.834988 2.03385 0.864809 2.26302 0.864809C2.26302 0.805167 2.26302 0.745525 2.26302 0.715704C2.29167 0.387672 2.4349 0.149107 2.72135 0.0298229C2.75 0.0298229 2.77864 0 2.80729 0C4.64062 0 6.41667 0 8.19271 0ZM2.29167 1.75944C2.09115 1.75944 1.89062 1.75944 1.6901 1
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4729
                                                                                                                                                                                                                                                    Entropy (8bit):3.9826071199242548
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:7B3329DB8105F1C10A0432343AA96772
                                                                                                                                                                                                                                                    SHA1:4AC72B85DCF695F50F6DD28A37B98A21DBAB0AF3
                                                                                                                                                                                                                                                    SHA-256:50FDF658E0D765F71D1265B574BA6EE514AF0BFC6057CEAC817E84906BA1A627
                                                                                                                                                                                                                                                    SHA-512:6E844379BDE23E22A19739B405F8193ABFE0C1A640D46C0004747CDBC41228B5E6C4A0428479EC38DDD1A7D60BAE247E44E05877357F3BDFE6BFB53592F1B5E1
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="11" height="15" viewBox="0 0 11 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M8.19271 0C8.45052 0.0894632 8.65104 0.238569 8.73698 0.53678C8.76563 0.626243 8.76563 0.745525 8.76563 0.864809C8.88021 0.864809 8.99479 0.864809 9.08073 0.864809C9.33854 0.864809 9.59635 0.864813 9.82552 0.924455C10.513 1.07356 10.9714 1.72962 11 2.44533C11 2.80318 11 3.16103 11 3.51889C11 6.76938 11 10.0497 11 13.3002C11 13.9861 10.7135 14.5229 10.112 14.8509C9.91146 14.9404 9.68229 15 9.45313 15C6.81771 15 4.18229 15 1.51823 15C0.658851 15 0 14.2843 0 13.3598C0 11.004 0 8.61829 0 6.26242C0 5.03976 0 3.78728 0 2.56461C0 1.84891 0.286453 1.31213 0.916662 1.01391C1.11718 0.924451 1.375 0.89463 1.60417 0.864809C1.80469 0.834988 2.03385 0.864809 2.26302 0.864809C2.26302 0.805167 2.26302 0.745525 2.26302 0.715704C2.29167 0.387672 2.4349 0.149107 2.72135 0.0298229C2.75 0.0298229 2.77864 0 2.80729 0C4.64062 0 6.41667 0 8.19271 0ZM2.29167 1.75944C2.09115 1.75944 1.89062 1.75944 1.6901 1
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1592
                                                                                                                                                                                                                                                    Entropy (8bit):4.004290849514056
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:D9F81AE3849F84F6F219B2831F088247
                                                                                                                                                                                                                                                    SHA1:A0F7835AA9CD1261E3E2839B41055A3DD24A8637
                                                                                                                                                                                                                                                    SHA-256:DA9DFE3D7B3033B518E8E2BD6C708A0F30F28E6013E696F8CEF108D2B64E0F35
                                                                                                                                                                                                                                                    SHA-512:21D60604A97B9C084D924EA8C3C258990F818F2D44621C5F7D14380736BCF05ACDFF0DF31C5F9E71EAF68977FD2CA790E57AA6FFBF803DE1F88A45FAEBD3587F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M0.930186 15.0723C0.877158 14.88 0.80093 14.6911 0.784359 14.4956C0.761161 14.1741 0.933506 13.9288 1.15225 13.7101C2.94199 11.9204 4.73173 10.1306 6.52146 8.34088C6.58112 8.28122 6.64078 8.22156 6.72032 8.14202C6.65072 8.07242 6.59438 8.01608 6.53472 7.95642C4.77152 6.19322 3.01494 4.42338 1.24511 2.67344C0.800997 2.23595 0.638599 1.78189 0.933576 1.20851C1.02638 1.11571 1.11918 1.02291 1.20866 0.933425C1.4009 0.880395 1.58981 0.804165 1.78535 0.787593C2.10684 0.764391 2.3521 0.936733 2.57085 1.15548C4.36056 2.94519 6.15028 4.73491 7.94331 6.52795C8.00297 6.5876 8.06263 6.64726 8.14217 6.7268C8.21177 6.6572 8.26812 6.60086 8.32777 6.5412C10.1275 4.74152 11.9271 2.94184 13.7268 1.14216C14.1312 0.73781 14.6151 0.671521 15.0525 0.943292C15.5165 1.23495 15.6458 1.88787 15.3309 2.3353C15.258 2.43473 15.1752 2.52422 15.0857 2.61371C13.3092 4.39019 11.5327 6.16667 9.75623 7.94315C9.69658
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1590
                                                                                                                                                                                                                                                    Entropy (8bit):4.012220474436418
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:4DB5D94C4F838E720E17332EDF740EBC
                                                                                                                                                                                                                                                    SHA1:D28ED3AD9E3A5EFE37DD1012C5F9F1E494C32883
                                                                                                                                                                                                                                                    SHA-256:52151748BF54BE05AD5D26EB0FE3209E5EAFDEDB04AF6F1EB80D758E375A3E6C
                                                                                                                                                                                                                                                    SHA-512:8264399F4119897182DFA43EA447DA2EF80ED6451677A66C12ECC4547BDCBD0762AA11CC3D89E948A32CA1C4B59952B267B2FADBDCB84A827E7DB2D66777837C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M0.930186 15.0723C0.877158 14.88 0.80093 14.6911 0.784359 14.4956C0.761161 14.1741 0.933506 13.9288 1.15225 13.7101C2.94199 11.9204 4.73173 10.1306 6.52146 8.34088C6.58112 8.28122 6.64078 8.22156 6.72032 8.14202C6.65072 8.07242 6.59438 8.01608 6.53472 7.95642C4.77152 6.19322 3.01494 4.42338 1.24511 2.67344C0.800997 2.23595 0.638599 1.78189 0.933576 1.20851C1.02638 1.11571 1.11918 1.02291 1.20866 0.933425C1.4009 0.880395 1.58981 0.804165 1.78535 0.787593C2.10684 0.764391 2.3521 0.936733 2.57085 1.15548C4.36056 2.94519 6.15028 4.73491 7.94331 6.52795C8.00297 6.5876 8.06263 6.64726 8.14217 6.7268C8.21177 6.6572 8.26812 6.60086 8.32777 6.5412C10.1275 4.74152 11.9271 2.94184 13.7268 1.14216C14.1312 0.73781 14.6151 0.671521 15.0525 0.943292C15.5165 1.23495 15.6458 1.88787 15.3309 2.3353C15.258 2.43473 15.1752 2.52422 15.0857 2.61371C13.3092 4.39019 11.5327 6.16667 9.75623 7.94315C9.69658
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4264
                                                                                                                                                                                                                                                    Entropy (8bit):3.894045254391696
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:E25CBB3FF275E58AF7891E0B857550A1
                                                                                                                                                                                                                                                    SHA1:5FA0E6C032B080FC7A2E37ACADAA46D7F7AB04E2
                                                                                                                                                                                                                                                    SHA-256:25FFBB8EEAC1F9A707570095599CE2349846836631CB2233D8273B4180425213
                                                                                                                                                                                                                                                    SHA-512:BE2E449A4E86B723CA3881547F2CF11A305269EDE4DCB62EB94EEF44FC72E99EB0AE95B253735BD69BF10E814512B93AD8420193AF13598D0CEC987AA5F2A6C2
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="20" height="21" viewBox="0 0 20 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M20.0001 10.7624L19.9644 10.7985C19.7505 11.593 19.2514 11.9903 18.4315 11.9903C16.542 11.9903 14.6525 11.9903 12.763 11.9903C12.6204 11.9903 12.5135 11.9903 12.3709 11.9903C11.4796 11.9903 10.8379 11.3402 10.8379 10.4374C10.8379 9.78739 10.8379 9.17347 10.8379 8.52344C10.8379 6.32057 10.8379 4.1538 10.8379 1.95092C10.8379 0.903652 11.1231 0.506411 12.0857 0.181396C14.3316 0.181396 16.542 0.181396 18.788 0.181396C19.1088 0.289735 19.4653 0.434186 19.6436 0.723088C19.7862 0.939764 19.8575 1.19255 19.9644 1.44534C20.0001 4.58715 20.0001 7.69285 20.0001 10.7624ZM18.7523 6.14C18.7523 4.69549 18.7523 3.28709 18.7523 1.84258C18.7523 1.55368 18.7167 1.51757 18.4315 1.51757C16.435 1.51757 14.4386 1.51757 12.4422 1.51757C12.157 1.51757 12.0857 1.55368 12.0857 1.84258C12.0857 4.69549 12.0857 7.58451 12.0857 10.4374C12.0857 10.7263 12.157 10.7985 12.4422 10.7985C14.4386 10.7985 16.435 10.7985
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4238
                                                                                                                                                                                                                                                    Entropy (8bit):3.914834455290012
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:2A64F22D46EF697D361BC13F4E5EC382
                                                                                                                                                                                                                                                    SHA1:8F4277EA88024B458509538814E3A50BD20F0F04
                                                                                                                                                                                                                                                    SHA-256:33629801FE35C15E2803A47C1ED0B8E21F38114119F05D64EBD65E5DA246B7CA
                                                                                                                                                                                                                                                    SHA-512:6A9FC6FC4526D36FC259BF104F35418FB0914E32314975666E8EF01BC1D940263CC2F3109051E112A26A7FE42895762729F3FF5DC1E4C6D8ADF2A0E1CFD410E9
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="20" height="20" viewBox="0 0 20 20" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M20.0001 10.4456L19.9644 10.4813C19.7505 11.2656 19.2514 11.6578 18.4315 11.6578C16.542 11.6578 14.6525 11.6578 12.763 11.6578C12.6204 11.6578 12.5135 11.6578 12.3709 11.6578C11.4796 11.6578 10.8379 11.016 10.8379 10.1248C10.8379 9.48307 10.8379 8.87701 10.8379 8.23529C10.8379 6.06061 10.8379 3.92157 10.8379 1.74688C10.8379 0.713012 11.1231 0.320856 12.0857 0C14.3316 0 16.542 0 18.788 0C19.1088 0.106952 19.4653 0.249554 19.6436 0.534759C19.7862 0.748663 19.8575 0.998217 19.9644 1.24777C20.0001 4.34938 20.0001 7.41533 20.0001 10.4456ZM18.7523 5.88235C18.7523 4.45633 18.7523 3.06595 18.7523 1.63993C18.7523 1.35472 18.7167 1.31907 18.4315 1.31907C16.435 1.31907 14.4386 1.31907 12.4422 1.31907C12.157 1.31907 12.0857 1.35472 12.0857 1.63993C12.0857 4.45633 12.0857 7.30838 12.0857 10.1248C12.0857 10.41 12.157 10.4813 12.4422 10.4813C14.4386 10.4813 16.435 10.4813 18.4315 10.4813C18.7167
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):6098
                                                                                                                                                                                                                                                    Entropy (8bit):3.8868971852897896
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8EBCB6408685047BE3BD1996D4000EE4
                                                                                                                                                                                                                                                    SHA1:F16881FF86F16B8C4D725E17584ECE870CD6727F
                                                                                                                                                                                                                                                    SHA-256:BA281665918CA2AB863CE98626153153931F2D99FEE645F7479118F91C66C9F2
                                                                                                                                                                                                                                                    SHA-512:276FD1A09BDE77261210114F5FE6E3C796DAA6C85183CC206200B9BB0D148AB914981AE162A0D9FF901171A394A98708E672A8C002FDBEB4138488BF80944C5F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="16" height="11" viewBox="0 0 16 11" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M16 8.62987C15.9472 8.92217 15.9117 9.21777 15.8394 9.50569C15.7505 9.90773 15.5371 10.275 15.2269 10.56C14.6695 11.057 13.8597 11.138 13.1554 10.7669C12.6421 10.4875 12.1924 10.1131 11.8329 9.66553C11.4245 9.17616 11.0495 8.66271 10.6675 8.15364C10.6453 8.11432 10.6121 8.08164 10.5716 8.05922C10.5311 8.0368 10.4849 8.02553 10.4381 8.02664C8.81238 8.03102 7.18705 8.03102 5.5621 8.02664C5.51686 8.02284 5.47145 8.03194 5.43163 8.0528C5.39182 8.07365 5.35938 8.10532 5.33844 8.14378C4.90194 8.82765 4.38931 9.46449 3.80946 10.0432C3.47452 10.3927 3.06867 10.6735 2.61655 10.8687C2.2413 11.0212 1.82147 11.0416 1.43196 10.9261C1.04246 10.8106 0.708611 10.5667 0.489974 10.2381C0.217225 9.81192 0.0595757 9.32778 0.0311659 8.82912C-0.0766541 7.71682 0.109163 6.6286 0.375272 5.55243C0.728555 4.12921 1.22177 2.74649 1.97078 1.46231C2.19701 1.09466 2.45605 0.746321 2.74502 0.421172C2.85915 0.287
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):6086
                                                                                                                                                                                                                                                    Entropy (8bit):3.9063223215918432
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:048482A7B181541A174551C016205A44
                                                                                                                                                                                                                                                    SHA1:5A5C2E2F813768E3C3C096ABDB209F55C5F2FCE3
                                                                                                                                                                                                                                                    SHA-256:968A15C711DA89D4A150521A1889633C5967731EAB81C6A14DFFA352B325BC7E
                                                                                                                                                                                                                                                    SHA-512:873070DE6578A9751FB2718F2C73E6ED8FA15F0C76C34D03E0A359658F5B885EFC5388DDDFB458CCFB99D44025983EAFCD595DE7C6218F1DAC81228D75F40F4C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="16" height="11" viewBox="0 0 16 11" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M16 8.62987C15.9472 8.92217 15.9117 9.21777 15.8394 9.50569C15.7505 9.90773 15.5371 10.275 15.2269 10.56C14.6695 11.057 13.8597 11.138 13.1554 10.7669C12.6421 10.4875 12.1924 10.1131 11.8329 9.66553C11.4245 9.17616 11.0495 8.66271 10.6675 8.15364C10.6453 8.11432 10.6121 8.08164 10.5716 8.05922C10.5311 8.0368 10.4849 8.02553 10.4381 8.02664C8.81238 8.03102 7.18705 8.03102 5.5621 8.02664C5.51686 8.02284 5.47145 8.03194 5.43163 8.0528C5.39182 8.07365 5.35938 8.10532 5.33844 8.14378C4.90194 8.82765 4.38931 9.46449 3.80946 10.0432C3.47452 10.3927 3.06867 10.6735 2.61655 10.8687C2.2413 11.0212 1.82147 11.0416 1.43196 10.9261C1.04246 10.8106 0.708611 10.5667 0.489974 10.2381C0.217225 9.81192 0.0595757 9.32778 0.0311659 8.82912C-0.0766541 7.71682 0.109163 6.6286 0.375272 5.55243C0.728555 4.12921 1.22177 2.74649 1.97078 1.46231C2.19701 1.09466 2.45605 0.746321 2.74502 0.421172C2.85915 0.287
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):6801
                                                                                                                                                                                                                                                    Entropy (8bit):3.7386877939405805
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:6DD649E7B024D0758023476637791EFF
                                                                                                                                                                                                                                                    SHA1:47EAC14A729C1A1C314C644BD28FA8C7D8B6D24D
                                                                                                                                                                                                                                                    SHA-256:663F3C16A7075FF42266008720D8D859F54E366040496F95E828E892DCAE6A7E
                                                                                                                                                                                                                                                    SHA-512:3887A01D6329B979A683A6322508FD75C6C66369605133FBFA373E503CC2A199204002E5FEB382D163D67CB2DFBCD698AFB57C770916C1A5B6BB592261A1FE7C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="21" height="21" viewBox="0 0 21 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M9.56484 0C10.1938 0 10.8227 0 11.4516 0C11.4734 0.0109432 11.4953 0.0273583 11.5227 0.0328299C12.3539 0.207921 12.9336 0.798855 13.0703 1.63054C13.1031 1.82204 13.0977 2.02449 13.0922 2.22147C13.0922 2.33637 13.125 2.38562 13.2344 2.42392C13.4859 2.51147 13.732 2.60995 13.9781 2.71391C14.1203 2.7741 14.2734 2.90542 14.4047 2.88901C14.5305 2.86712 14.6344 2.6975 14.7492 2.58807C15.5203 1.86582 16.6469 1.8494 17.418 2.57165C17.7789 2.90542 18.1289 3.2556 18.457 3.61673C18.8891 4.09276 19.0367 4.65633 18.9164 5.29104C18.8398 5.71782 18.6156 6.06253 18.3094 6.358C18.0742 6.58781 18.0797 6.58781 18.2109 6.8778C18.3148 7.10761 18.4133 7.34289 18.5008 7.57817C18.6266 7.91193 18.6211 7.91193 18.9766 7.91193C19.8516 7.91741 20.5461 8.35513 20.8523 9.11569C20.9125 9.25795 20.9508 9.41115 21 9.55889C21 10.1881 21 10.8174 21 11.4466C20.9836 11.4904 20.9672 11.5341 20.9563 11.5779C20.8141 12.1
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):6797
                                                                                                                                                                                                                                                    Entropy (8bit):3.744755737482207
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:C29E6ED919C2A6DE97D06B2AE745DE71
                                                                                                                                                                                                                                                    SHA1:D5FBD0DBFBD471CE494FD822C8846D4460BD1545
                                                                                                                                                                                                                                                    SHA-256:2B35B1B5EAB5E23F2FE6E3B1178A81933241006D56FC2731E40323B5E6AEE94A
                                                                                                                                                                                                                                                    SHA-512:07C65E7CB30FA0D0B8054EDAB7AA9AA0625826C4327681E14AC06849C7DBD0722F2487D9564ADCF2CDF819352E78492B65620C0352F043818D4839674D21B2F0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="21" height="21" viewBox="0 0 21 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M9.56484 0C10.1938 0 10.8227 0 11.4516 0C11.4734 0.0109432 11.4953 0.0273583 11.5227 0.0328299C12.3539 0.207921 12.9336 0.798855 13.0703 1.63054C13.1031 1.82204 13.0977 2.02449 13.0922 2.22147C13.0922 2.33637 13.125 2.38562 13.2344 2.42392C13.4859 2.51147 13.732 2.60995 13.9781 2.71391C14.1203 2.7741 14.2734 2.90542 14.4047 2.88901C14.5305 2.86712 14.6344 2.6975 14.7492 2.58807C15.5203 1.86582 16.6469 1.8494 17.418 2.57165C17.7789 2.90542 18.1289 3.2556 18.457 3.61673C18.8891 4.09276 19.0367 4.65633 18.9164 5.29104C18.8398 5.71782 18.6156 6.06253 18.3094 6.358C18.0742 6.58781 18.0797 6.58781 18.2109 6.8778C18.3148 7.10761 18.4133 7.34289 18.5008 7.57817C18.6266 7.91193 18.6211 7.91193 18.9766 7.91193C19.8516 7.91741 20.5461 8.35513 20.8523 9.11569C20.9125 9.25795 20.9508 9.41115 21 9.55889C21 10.1881 21 10.8174 21 11.4466C20.9836 11.4904 20.9672 11.5341 20.9563 11.5779C20.8141 12.1
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3605
                                                                                                                                                                                                                                                    Entropy (8bit):3.914389459303166
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:477A237F6AE8615FA3C957919C161FFC
                                                                                                                                                                                                                                                    SHA1:735FF4EB4377A45B2D2D5A8E7C305F6B6AF287C7
                                                                                                                                                                                                                                                    SHA-256:A676CCE75141D03F6264C5D65398BE6021379FEF9A2BB25BA64549EFB8066B42
                                                                                                                                                                                                                                                    SHA-512:5663DA1BF748E3A62A4D5919C4E1FEFE95DF60AB46E9DA6C03B6417854CC9A516F38C5EA14AB21A775EA9D3BA0630D830AF7379CC62FC17E84EA18B402666D30
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M13.98 6.12847C13.98 6.2105 13.9925 6.29644 13.9759 6.37457C13.9344 6.59722 13.7107 6.75347 13.4828 6.73394C13.2424 6.71441 13.0601 6.53082 13.0559 6.28863C13.0476 5.76519 12.9813 5.24957 12.828 4.74175C12.5504 3.82379 12.0614 3.0191 11.3611 2.3316C11.1042 2.0816 11.0793 1.81597 11.2906 1.62457C11.502 1.43316 11.7838 1.47222 12.0365 1.72222C13.0684 2.74175 13.6982 3.94488 13.9179 5.33941C13.9593 5.60113 13.9717 5.86285 14.0007 6.12457C13.9883 6.12847 13.9842 6.12847 13.98 6.12847Z" fill="#494444"/>..<path d="M7.1786 0C7.39409 0.0859375 7.63029 0.148438 7.82505 0.269531C8.19386 0.503906 8.37205 0.859375 8.38863 1.28125C8.39691 1.5 8.38863 1.71875 8.38863 1.94141C8.59582 2.01953 8.79887 2.08203 8.99364 2.17188C10.7879 3.01563 11.7369 4.38281 11.8074 6.27734C11.8322 6.92969 11.7991 7.58594 11.8405 8.23828C11.9275 9.54297 12.4041 10.7187 13.2163 11.7734C13.3986 12.0078 13.6058 12.2305
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3599
                                                                                                                                                                                                                                                    Entropy (8bit):3.928807214825618
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:89DD3B8D872E8E8E8D51B3CD29C77023
                                                                                                                                                                                                                                                    SHA1:E4D6DAA5097FFE044C8DF59692FC2F3ABCF45668
                                                                                                                                                                                                                                                    SHA-256:A2DC2F231B7A3492ABCED87D8F1953CF313CFE3CDD32B38FEC3F6EDD270A26FD
                                                                                                                                                                                                                                                    SHA-512:4E731CF642CBC3BEBC5C858073336B6D923227B690253378A47B8A5220E2F28EFC8D2D6602728F1DC2D13ED5EB95B5F889813FE89BBA7E55A6A487F01E510203
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M13.98 6.12847C13.98 6.2105 13.9925 6.29644 13.9759 6.37457C13.9344 6.59722 13.7107 6.75347 13.4828 6.73394C13.2424 6.71441 13.0601 6.53082 13.0559 6.28863C13.0476 5.76519 12.9813 5.24957 12.828 4.74175C12.5504 3.82379 12.0614 3.0191 11.3611 2.3316C11.1042 2.0816 11.0793 1.81597 11.2906 1.62457C11.502 1.43316 11.7838 1.47222 12.0365 1.72222C13.0684 2.74175 13.6982 3.94488 13.9179 5.33941C13.9593 5.60113 13.9717 5.86285 14.0007 6.12457C13.9883 6.12847 13.9842 6.12847 13.98 6.12847Z" fill="white"/>..<path d="M7.1786 0C7.39409 0.0859375 7.63029 0.148438 7.82505 0.269531C8.19386 0.503906 8.37205 0.859375 8.38863 1.28125C8.39691 1.5 8.38863 1.71875 8.38863 1.94141C8.59582 2.01953 8.79887 2.08203 8.99364 2.17188C10.7879 3.01563 11.7369 4.38281 11.8074 6.27734C11.8322 6.92969 11.7991 7.58594 11.8405 8.23828C11.9275 9.54297 12.4041 10.7187 13.2163 11.7734C13.3986 12.0078 13.6058 12.2305 13
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2232
                                                                                                                                                                                                                                                    Entropy (8bit):3.9969278840420657
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:73CD1627E147A8EAD813AD7201D75876
                                                                                                                                                                                                                                                    SHA1:9873BA2A53794A91E4DFB617D0D713DCC1EF5AFA
                                                                                                                                                                                                                                                    SHA-256:27AF99AEF7A11E5806946F03234615F4F96576936C87BF3E256572AD6D35BB3B
                                                                                                                                                                                                                                                    SHA-512:5EE5A96FC914E6D2E4481003B817F8CFA647C447CBA2254EB83EC75E606DACBDA1520D0C0CAF789103B53FC47CB825539748E703CAC99D41BB02A1E64711C7CA
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="12" height="14" viewBox="0 0 12 14" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M7.09854 10.2731C7.43835 9.88812 7.85096 9.62347 8.33639 9.50318C9.59851 9.19042 10.8849 9.98435 11.1519 11.2595C11.4189 12.5105 10.5451 13.7615 9.25871 13.954C7.94805 14.1705 6.73447 13.2323 6.61311 11.9331C6.58884 11.7166 6.51602 11.476 6.44321 11.2595C6.17622 10.4415 5.90923 9.62347 5.66652 8.80548C5.64225 8.75736 5.64225 8.70924 5.61798 8.63707C5.59371 8.70924 5.56943 8.7333 5.54516 8.78142C5.22963 9.74376 4.9141 10.7302 4.62284 11.6925C4.5743 11.8369 4.5743 11.9812 4.55003 12.1496C4.30731 13.3285 3.19082 14.1465 2.02578 13.9781C0.763661 13.8097 -0.110117 12.727 0.0112413 11.5C0.108328 10.5618 0.642303 9.88812 1.54035 9.57535C2.4384 9.26259 3.23936 9.47912 3.91897 10.1287C3.96751 10.1768 4.01605 10.2249 4.0646 10.2731C4.08887 10.2249 4.11314 10.1768 4.11314 10.1287C5.15682 6.90485 6.17622 3.65694 7.2199 0.433091C7.29272 0.240623 7.3898 0.0722124 7.60825 0.0240953C7.97232 -0.048
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2228
                                                                                                                                                                                                                                                    Entropy (8bit):4.011244246624798
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:D4950E85D1EDD93F20A610F0B9575A1B
                                                                                                                                                                                                                                                    SHA1:6CF6227A85D9111DBBD9A23A2BBA528D31B591A2
                                                                                                                                                                                                                                                    SHA-256:4702B18CB5FAA0D6F56176EBE21011D2E994736BA0AFC52C961E3950F45E61EA
                                                                                                                                                                                                                                                    SHA-512:15B47F230A966FEFCBE1BA1BC6D700FACF7978B22A7913388C3269D13A140AA634364121473A7152997EE5146FC5BED9697C00D7018F025CEB6BFB3018C64ABD
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="12" height="14" viewBox="0 0 12 14" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M7.09854 10.2731C7.43835 9.88812 7.85096 9.62347 8.33639 9.50318C9.59851 9.19042 10.8849 9.98435 11.1519 11.2595C11.4189 12.5105 10.5451 13.7615 9.25871 13.954C7.94805 14.1705 6.73447 13.2323 6.61311 11.9331C6.58884 11.7166 6.51602 11.476 6.44321 11.2595C6.17622 10.4415 5.90923 9.62347 5.66652 8.80548C5.64225 8.75736 5.64225 8.70924 5.61798 8.63707C5.59371 8.70924 5.56943 8.7333 5.54516 8.78142C5.22963 9.74376 4.9141 10.7302 4.62284 11.6925C4.5743 11.8369 4.5743 11.9812 4.55003 12.1496C4.30731 13.3285 3.19082 14.1465 2.02578 13.9781C0.763661 13.8097 -0.110117 12.727 0.0112413 11.5C0.108328 10.5618 0.642303 9.88812 1.54035 9.57535C2.4384 9.26259 3.23936 9.47912 3.91897 10.1287C3.96751 10.1768 4.01605 10.2249 4.0646 10.2731C4.08887 10.2249 4.11314 10.1768 4.11314 10.1287C5.15682 6.90485 6.17622 3.65694 7.2199 0.433091C7.29272 0.240623 7.3898 0.0722124 7.60825 0.0240953C7.97232 -0.048
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):702
                                                                                                                                                                                                                                                    Entropy (8bit):4.39074490019929
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:86893B121171A45F3494D301D57E80F1
                                                                                                                                                                                                                                                    SHA1:739B6A99982CE3F6BF792876E72A8413D1583072
                                                                                                                                                                                                                                                    SHA-256:4D8B0003A1DA38931E9BA26483D517CD59E62EA14759FC36F14B0F1EC558C6B8
                                                                                                                                                                                                                                                    SHA-512:CABD9B44F635F3A1C9C8054004DE318FC3F875F6FD81DB722CD49FD29912E0720B656DD1BA81A5FF8B63C728A81A9A393618E0D18B07227F2AC937A954D9FEB0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="12" height="12" viewBox="0 0 12 12" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M0.146939 11.1478L3.03184 8.26286C2.31673 7.39102 1.88571 6.27429 1.88571 5.05714C1.88571 2.26531 4.15102 0 6.94286 0C9.73714 0 12 2.26531 12 5.05714C12 7.84898 9.73714 10.1143 6.94286 10.1143C5.72571 10.1143 4.61143 9.68571 3.73959 8.97061L0.854693 11.8531C0.658775 12.049 0.342857 12.049 0.146939 11.8531C-0.0489798 11.6596 -0.0489798 11.3412 0.146939 11.1478ZM6.94286 9.10775C9.17878 9.10775 10.9959 7.29061 10.9959 5.05714C10.9959 2.82367 9.17878 1.00408 6.94286 1.00408C4.70939 1.00408 2.8898 2.82367 2.8898 5.05714C2.8898 7.29061 4.70939 9.10775 6.94286 9.10775Z" fill="#827A7A"/>..</svg>..
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):700
                                                                                                                                                                                                                                                    Entropy (8bit):4.387297248681374
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:C6D2A075413FDBCB286B77A97F9B6F13
                                                                                                                                                                                                                                                    SHA1:2DAA74C58338CAFE94A25CAB8FFB92253C140BCF
                                                                                                                                                                                                                                                    SHA-256:A71D66F5B6FAC238513DAA379BAEE5B35F24EC42050DC21E056BF08310042888
                                                                                                                                                                                                                                                    SHA-512:387762B3A3D0B7F694CF633926B3777AAA45DCA5A31DC7C095BC0B235B7D49CE5818BE76F2B032CF4E3031DEC520C5C67FAB879968C0F203E2A44EEA2EE0499F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="12" height="12" viewBox="0 0 12 12" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M0.146939 11.1478L3.03184 8.26286C2.31673 7.39102 1.88571 6.27429 1.88571 5.05714C1.88571 2.26531 4.15102 0 6.94286 0C9.73714 0 12 2.26531 12 5.05714C12 7.84898 9.73714 10.1143 6.94286 10.1143C5.72571 10.1143 4.61143 9.68571 3.73959 8.97061L0.854693 11.8531C0.658775 12.049 0.342857 12.049 0.146939 11.8531C-0.0489798 11.6596 -0.0489798 11.3412 0.146939 11.1478ZM6.94286 9.10775C9.17878 9.10775 10.9959 7.29061 10.9959 5.05714C10.9959 2.82367 9.17878 1.00408 6.94286 1.00408C4.70939 1.00408 2.8898 2.82367 2.8898 5.05714C2.8898 7.29061 4.70939 9.10775 6.94286 9.10775Z" fill="white"/>..</svg>..
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3466
                                                                                                                                                                                                                                                    Entropy (8bit):3.9394896115708424
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:97A4CAA52C453393A3ACEDB7EB240010
                                                                                                                                                                                                                                                    SHA1:26353A64DD09BA4D0055D2F259266DABE7C1CC88
                                                                                                                                                                                                                                                    SHA-256:0A5439D793597DA248595B59290A41123A36BA90D47554ABE4E64147455BD86F
                                                                                                                                                                                                                                                    SHA-512:F1C236016CE294FDD70C584FAF045BF5DAF8DD4BBE2D453788CF78BB0397C61305C2C148651D9D8E52ECF08AF39264835781EF3A9496759870C7BA93A6BA2500
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="21" height="21" viewBox="0 0 21 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M9.89765 0C10.3083 0 10.719 0 11.1297 0C11.1845 0.0136988 11.2392 0.0273993 11.294 0.0273993C12.7588 0.123291 14.1551 0.520555 15.442 1.23289C18.399 2.86305 20.206 5.34254 20.8357 8.67136C20.9179 9.06862 20.9452 9.47958 21 9.87685C21 10.2878 21 10.6988 21 11.1097C20.9863 11.1645 20.9726 11.233 20.9589 11.2878C20.8631 12.7536 20.4661 14.1372 19.7679 15.4249C18.1389 18.3838 15.661 20.1921 12.3344 20.8222C11.9374 20.9044 11.5267 20.9318 11.116 20.9866C10.6917 20.9866 10.2673 20.9866 9.84289 20.9866C9.59648 20.9592 9.35007 20.9318 9.08996 20.8907C7.78944 20.6989 6.57106 20.3154 5.42112 19.6852C5.33898 19.6441 5.20209 19.6304 5.10626 19.6578C4.59974 19.8085 4.10691 19.9729 3.60039 20.1373C2.72425 20.4249 1.8618 20.7126 0.985658 20.9866C0.87614 20.9866 0.766624 20.9866 0.657106 20.9866C0.328553 20.877 0.109518 20.6578 0 20.329C0 20.2195 0 20.1099 0 20.0003C0.0136897 19.9866 0.027379 19.9
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3460
                                                                                                                                                                                                                                                    Entropy (8bit):3.951932320279216
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:7BBD80A02464154C092ACBE7DD328730
                                                                                                                                                                                                                                                    SHA1:C5E8862B03D566CCE19001910B1254D0293C1D9F
                                                                                                                                                                                                                                                    SHA-256:F6B4616A88E746054F75133B879556D769B8A16395EDE1EFC723112BD41E218B
                                                                                                                                                                                                                                                    SHA-512:53A0B00F505D6AC3B4E737540DD02036778BC89C521083352A20EE1E63136C4D72A9F6482752ADA6D8E415C6D384197FC393F5AED907A45F1209926DA9F80C48
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="21" height="21" viewBox="0 0 21 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M9.89765 0C10.3083 0 10.719 0 11.1297 0C11.1845 0.0136988 11.2392 0.0273993 11.294 0.0273993C12.7588 0.123291 14.1551 0.520555 15.442 1.23289C18.399 2.86305 20.206 5.34254 20.8357 8.67136C20.9179 9.06862 20.9452 9.47958 21 9.87685C21 10.2878 21 10.6988 21 11.1097C20.9863 11.1645 20.9726 11.233 20.9589 11.2878C20.8631 12.7536 20.4661 14.1372 19.7679 15.4249C18.1389 18.3838 15.661 20.1921 12.3344 20.8222C11.9374 20.9044 11.5267 20.9318 11.116 20.9866C10.6917 20.9866 10.2673 20.9866 9.84289 20.9866C9.59648 20.9592 9.35007 20.9318 9.08996 20.8907C7.78944 20.6989 6.57106 20.3154 5.42112 19.6852C5.33898 19.6441 5.20208 19.6304 5.10626 19.6578C4.59974 19.8085 4.10691 19.9729 3.60039 20.1373C2.72425 20.4249 1.8618 20.7126 0.985658 20.9866C0.87614 20.9866 0.766624 20.9866 0.657106 20.9866C0.328553 20.877 0.109518 20.6578 0 20.329C0 20.2195 0 20.1099 0 20.0003C0.0136897 19.9866 0.027379 19.9
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4403
                                                                                                                                                                                                                                                    Entropy (8bit):3.8960426134967934
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:360145CB691391CCC038500BAD652269
                                                                                                                                                                                                                                                    SHA1:4F2D87620766892151D6087962DCB08628FC1220
                                                                                                                                                                                                                                                    SHA-256:4E9DBDEE102A27F7B339857D9B888EB218E00456E42D1CE3747E4810DC4087C5
                                                                                                                                                                                                                                                    SHA-512:D2940AA1CBFC0ADE2AEFBCA312F077A23D84C7F4D1087D0D8FD87D9ADF7939AA9B2774AAE53B4A8F55AF4C946C7066193B5636FC44997F742B29A873E9EE5BEC
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="13" height="15" viewBox="0 0 13 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M4.62038 0C5.87329 0 7.12258 0 8.37549 0C8.39354 0.00732064 8.41159 0.0183016 8.42965 0.0219619C9.02541 0.124451 9.44425 0.560029 9.51285 1.16764C9.53451 1.35798 9.51646 1.55564 9.51646 1.76061C9.59951 1.76061 9.65006 1.76061 9.70422 1.76061C10.3577 1.76061 11.0149 1.75695 11.6684 1.76061C12.3111 1.76428 12.8202 2.17057 12.9647 2.78184C13.1019 3.34919 12.8311 3.97511 12.3003 4.23499C12.127 4.31918 12.08 4.42167 12.08 4.58638C12.08 4.59736 12.08 4.60469 12.0764 4.61567C11.9573 6.08712 11.8381 7.56223 11.719 9.03368C11.5962 10.5564 11.4698 12.0754 11.3471 13.5981C11.3182 13.9824 11.2207 14.3338 10.9391 14.6157C10.7296 14.8243 10.4697 14.9305 10.1917 15C7.72557 15 5.26308 15 2.79699 15C2.78977 14.9927 2.78255 14.9854 2.77533 14.9854C2.18318 14.8975 1.70657 14.396 1.65963 13.7299C1.59102 12.7928 1.50798 11.8521 1.43215 10.9151C1.33828 9.79136 1.24801 8.6713 1.15413 7.54758C1.07109 6.51
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4395
                                                                                                                                                                                                                                                    Entropy (8bit):3.9130769273478307
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:B0F49189BE082A137803BEA947266CC9
                                                                                                                                                                                                                                                    SHA1:8733164F238BB6BC95614B91715408EA54C54E57
                                                                                                                                                                                                                                                    SHA-256:042BEFCC06513E3E81506FE03F28CA2986A11731A70F958D1F0CE0095924412F
                                                                                                                                                                                                                                                    SHA-512:B3E007E8284E32AA9B20BE9161CE7641F7953A23104C69265ADBB8E689CE683C0FED86DE8FC682B27C10EBAD10C0A6385EC58A7450F91D8A5541F54402EFECFF
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="13" height="15" viewBox="0 0 13 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M4.62038 0C5.87329 0 7.12258 0 8.37549 0C8.39354 0.00732064 8.41159 0.0183016 8.42965 0.0219619C9.02541 0.124451 9.44425 0.560029 9.51285 1.16764C9.53451 1.35798 9.51646 1.55564 9.51646 1.76061C9.59951 1.76061 9.65006 1.76061 9.70422 1.76061C10.3577 1.76061 11.0149 1.75695 11.6684 1.76061C12.3111 1.76428 12.8202 2.17057 12.9647 2.78184C13.1019 3.34919 12.8311 3.97511 12.3003 4.23499C12.127 4.31918 12.08 4.42167 12.08 4.58638C12.08 4.59736 12.08 4.60469 12.0764 4.61567C11.9573 6.08712 11.8381 7.56223 11.719 9.03368C11.5962 10.5564 11.4698 12.0754 11.3471 13.5981C11.3182 13.9824 11.2207 14.3338 10.9391 14.6157C10.7296 14.8243 10.4697 14.9305 10.1917 15C7.72557 15 5.26308 15 2.79699 15C2.78977 14.9927 2.78255 14.9854 2.77533 14.9854C2.18318 14.8975 1.70657 14.396 1.65963 13.7299C1.59102 12.7928 1.50798 11.8521 1.43215 10.9151C1.33828 9.79136 1.24801 8.6713 1.15413 7.54758C1.07109 6.51
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1858
                                                                                                                                                                                                                                                    Entropy (8bit):4.054255384536267
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:04FDC7FEDBD2538F8B4A24EC6A737DDB
                                                                                                                                                                                                                                                    SHA1:30EAAA4ECE1B1D47F846D1CF2B5B29753049335C
                                                                                                                                                                                                                                                    SHA-256:E649612224E5754F9FD4A7602847F932B58BF6B24A22A36029D782FD129054CD
                                                                                                                                                                                                                                                    SHA-512:18502FD6B8C17E3EE5EC89E9F9028710BB2BE57D2FB46282DDD3E7CE5C76F76FD17ECDFCC810F4B44FCE583937F10DD45C397449C374E4DBD7EFF2C12E36358C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="19" height="21" viewBox="0 0 19 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M8.896 21C8.53124 20.9487 8.16142 20.9077 7.80173 20.8359C5.14713 20.3231 3.06499 18.9233 1.56544 16.6568C0.521838 15.0826 -0.00502985 13.334 3.61876e-05 11.4418C0.0101683 8.62669 1.02844 6.24228 3.05486 4.30398C3.81983 3.57584 4.69119 3.00665 5.6436 2.57592C6.08435 2.37594 6.54536 2.50926 6.77839 2.89897C7.00636 3.27843 6.92024 3.77069 6.57069 4.03734C6.47443 4.10912 6.36298 4.16553 6.25659 4.21681C4.39229 5.10904 3.05992 6.51918 2.28482 8.45235C1.75289 9.78044 1.6009 11.1547 1.81874 12.5751C2.07711 14.2467 2.79142 15.6928 3.96168 16.8978C5.00021 17.9695 6.25153 18.6925 7.70041 19.0309C9.72683 19.5078 11.6469 19.2207 13.4352 18.1592C15.1424 17.1491 16.3127 15.6723 16.9054 13.7647C17.5893 11.57 17.3613 9.44201 16.2316 7.43705C15.416 5.98589 14.2407 4.91931 12.7411 4.21681C12.4777 4.09374 12.2446 3.93478 12.1433 3.6425C12.0268 3.31432 12.118 2.93999 12.3764 2.70411C12.6651 2.44773 1
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1854
                                                                                                                                                                                                                                                    Entropy (8bit):4.069519451091226
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:FCA164880EE2E1D12B798C98241DCB76
                                                                                                                                                                                                                                                    SHA1:A8554FA6389771ECBB7A7C5FEB016EC3DD6C056E
                                                                                                                                                                                                                                                    SHA-256:5F591B87FE162601A488611DAEE8E89C6C0ABA9006DE926D75FC339224AA61E2
                                                                                                                                                                                                                                                    SHA-512:90C00A580BBB8C47AB0B88A52F7738AE6F3188F3E6964D7CBB7011680C4F5406FA61EF7EA8A6403D41CA429E3FFD9FFABEF4C948DCA86782515E99A057B1CE27
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="19" height="21" viewBox="0 0 19 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M8.896 21C8.53124 20.9487 8.16142 20.9077 7.80173 20.8359C5.14713 20.3231 3.06499 18.9233 1.56544 16.6568C0.521838 15.0826 -0.00502985 13.334 3.61876e-05 11.4418C0.0101683 8.62669 1.02844 6.24228 3.05486 4.30398C3.81983 3.57584 4.69119 3.00665 5.6436 2.57592C6.08435 2.37594 6.54536 2.50926 6.77839 2.89897C7.00636 3.27843 6.92024 3.77069 6.57069 4.03734C6.47443 4.10912 6.36298 4.16553 6.25659 4.21681C4.39229 5.10904 3.05992 6.51918 2.28482 8.45235C1.75289 9.78044 1.6009 11.1547 1.81874 12.5751C2.07711 14.2467 2.79142 15.6928 3.96168 16.8978C5.00021 17.9695 6.25153 18.6925 7.70041 19.0309C9.72683 19.5078 11.6469 19.2207 13.4352 18.1592C15.1424 17.1491 16.3127 15.6723 16.9054 13.7647C17.5893 11.57 17.3613 9.44201 16.2316 7.43705C15.416 5.98589 14.2407 4.91931 12.7411 4.21681C12.4777 4.09374 12.2446 3.93478 12.1433 3.6425C12.0268 3.31432 12.118 2.93999 12.3764 2.70411C12.6651 2.44773 1
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2922
                                                                                                                                                                                                                                                    Entropy (8bit):3.8955256034331684
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:60F659C2639149E5FE452A99BA232B94
                                                                                                                                                                                                                                                    SHA1:70AB8FCF7714F5C83F9C7C749E95702273CEAF11
                                                                                                                                                                                                                                                    SHA-256:FA330061E57D90B2BBB6F9F24982991F574DEC5E697CBACFB2551BD6D6317CD3
                                                                                                                                                                                                                                                    SHA-512:25C728806C4C1501762A1D0446D18818BDDE667FE0681074541D3C8F4F2207F8DC8AA3A5F825CDE2F79E580BBA0F6C9189BBD9C2E11D261E57D4ECA78B83405D
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M14.7852 5.44353C13.0198 3.71096 11.2747 1.96502 9.5161 0.225768C9.21289 -0.0752561 8.88947 -0.0752561 8.58626 0.225768C7.95964 0.841196 7.33975 1.45662 6.71986 2.07874C6.41665 2.37977 6.41665 2.69417 6.7266 3.00188C6.84788 3.12898 6.98264 3.2427 7.10392 3.36311C7.07697 3.40325 7.07023 3.42332 7.05676 3.4367C6.49077 3.99861 5.93152 4.56052 5.3588 5.10905C5.31163 5.15588 5.19709 5.17595 5.12971 5.16257C4.27399 5.00871 3.41153 4.92844 2.54234 5.04216C1.8416 5.12912 1.18802 5.34987 0.648983 5.82482C0.271659 6.16598 0.264921 6.48039 0.622032 6.83493C1.69336 7.89855 2.77143 8.96886 3.84276 10.0325C3.89667 10.086 3.94383 10.1395 4.02469 10.2198C3.88993 10.3402 3.76191 10.4472 3.64736 10.5609C2.50865 11.6915 1.3632 12.822 0.224493 13.9592C-0.0113341 14.1933 -0.0584993 14.4408 0.0695214 14.6883C0.197542 14.9291 0.453583 15.0562 0.743314 14.976C0.878073 14.9425 1.00609 14.8556 1.10716 14.75
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2920
                                                                                                                                                                                                                                                    Entropy (8bit):3.895777405127468
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:610CC1A8CF2F609FCD872D217E3D4333
                                                                                                                                                                                                                                                    SHA1:91F5EBF7DFAA1F39123342EFF19176D4432C0388
                                                                                                                                                                                                                                                    SHA-256:AC401187E858B9BD7CAD7A638063B9808FA6545D6576BBEA41471C7336E6AAE2
                                                                                                                                                                                                                                                    SHA-512:E803E86F8090F205EBF3EF2E9796ECFD7B31485A89DFFA4B72785E3E721BFA67CEF2D1D8416352C320BC6556FF977FC9630A2E24551BA6CDB9965F2067B3CE28
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M14.7852 5.44353C13.0198 3.71096 11.2747 1.96502 9.5161 0.225768C9.21289 -0.0752561 8.88947 -0.0752561 8.58626 0.225768C7.95964 0.841196 7.33975 1.45662 6.71986 2.07874C6.41665 2.37977 6.41665 2.69417 6.7266 3.00188C6.84788 3.12898 6.98264 3.2427 7.10392 3.36311C7.07697 3.40325 7.07023 3.42332 7.05676 3.4367C6.49077 3.99861 5.93152 4.56052 5.3588 5.10905C5.31163 5.15588 5.19709 5.17595 5.12971 5.16257C4.27399 5.00871 3.41153 4.92844 2.54234 5.04216C1.8416 5.12912 1.18802 5.34987 0.648983 5.82482C0.271659 6.16598 0.264921 6.48039 0.622032 6.83493C1.69336 7.89855 2.77143 8.96886 3.84276 10.0325C3.89667 10.086 3.94383 10.1395 4.02469 10.2198C3.88993 10.3402 3.76191 10.4472 3.64736 10.5609C2.50865 11.6915 1.3632 12.822 0.224493 13.9592C-0.0113341 14.1933 -0.0584993 14.4408 0.0695214 14.6883C0.197542 14.9291 0.453583 15.0562 0.743314 14.976C0.878073 14.9425 1.00609 14.8556 1.10716 14.75
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3445
                                                                                                                                                                                                                                                    Entropy (8bit):3.979453075901205
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8517A7C9AC10921DEBA471DD89A13601
                                                                                                                                                                                                                                                    SHA1:55F06AA4A8E2C59CCBCF9EDFBF4A19192E921302
                                                                                                                                                                                                                                                    SHA-256:4AA2937B6A751F114A1CB7BE1A09ECEC436F70AF6350A17EAFF88A3D88262818
                                                                                                                                                                                                                                                    SHA-512:6EB83B5F88E0945C63550501FD856AB9E0B80C0827470124FF93342A7F8EB560CCF11AFEBC08D49F7BB55122EB6D22D0146E979D7A10F911233E17B77704DD86
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="27" height="23" viewBox="0 0 27 23" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M26.576 17.9499C26.4889 18.2549 26.4453 18.5599 26.3582 18.8649C25.7918 20.9561 24.0056 22.5245 21.8708 22.7859C21.5223 22.8294 21.1737 22.8294 20.8252 22.8294C17.2527 22.8294 13.6367 22.8294 10.0642 22.8294C7.84227 22.8294 6.09959 21.3917 5.66392 19.257C5.44609 18.2549 5.62036 17.2529 6.14316 16.338C6.18673 16.2508 6.2303 16.2073 6.27387 16.1201C6.01247 15.9023 5.70749 15.6845 5.44609 15.4666C3.57271 13.6804 2.96277 11.502 3.70341 9.0623C4.44405 6.62255 6.18672 5.18485 8.7136 4.74918C11.3712 4.31351 13.9416 5.70765 15.1615 8.10383C15.2486 8.27809 15.3358 8.32166 15.51 8.36523C17.8191 8.5395 19.5182 9.62867 20.5202 11.6763C20.6509 11.8941 20.7381 11.9813 20.9995 11.9813C23.8313 11.9377 26.0968 13.9418 26.4889 16.7301C26.4889 16.7736 26.5325 16.8608 26.5325 16.9043C26.576 17.2529 26.576 17.6014 26.576 17.9499ZM15.5972 21.3046C16.5121 21.3046 17.4706 21.3046 18.3855 21.3046C19.3439 2
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3425
                                                                                                                                                                                                                                                    Entropy (8bit):4.01234712901125
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:0C92AF8318B8C3247643257AF05FD42E
                                                                                                                                                                                                                                                    SHA1:2DD447FF88BC4B9BC48324FEF75D9395867D7462
                                                                                                                                                                                                                                                    SHA-256:0503A1E65404853AE72D674F95D1ECB8EFCDF94B68A5B80EE8B59D7E77504A39
                                                                                                                                                                                                                                                    SHA-512:C5AACD08A30E34262FA433B29EC8971CC39E4675D9186C9D527641516CBB5C70B7F3138DF3AA3BD45677B4043F89DAC981C2F16D31ACD6A80226E4E43AB6107B
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="26" height="22" viewBox="0 0 26 22" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M26 17.2979C25.9147 17.5917 25.8721 17.8856 25.7869 18.1795C25.2328 20.1948 23.4853 21.7063 21.3968 21.9582C21.0558 22.0002 20.7149 22.0002 20.3739 22.0002C16.8789 22.0002 13.3413 22.0002 9.84631 22.0002C7.6726 22.0002 5.96772 20.6147 5.5415 18.5574C5.32839 17.5917 5.49888 16.6261 6.01034 15.7444C6.05297 15.6604 6.0956 15.6185 6.13822 15.5345C5.88249 15.3246 5.58412 15.1146 5.32839 14.9047C3.49565 13.1833 2.89895 11.0841 3.62352 8.7329C4.34809 6.38173 6.05296 4.99623 8.52503 4.57638C11.125 4.15653 13.6397 5.50005 14.8331 7.80923C14.9183 7.97717 15.0035 8.01915 15.174 8.06114C17.433 8.22908 19.0952 9.2787 20.0755 11.252C20.2034 11.4619 20.2887 11.5459 20.5444 11.5459C23.3148 11.5039 25.5311 13.4352 25.9147 16.1223C25.9147 16.1643 25.9574 16.2482 25.9574 16.2902C26 16.6261 26 16.962 26 17.2979ZM15.2593 20.5307C16.1543 20.5307 17.092 20.5307 17.9871 20.5307C18.9248 20.5307 19.8198 20.
                                                                                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    File Type:PNG image data, 490 x 140, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):11957
                                                                                                                                                                                                                                                    Entropy (8bit):7.943985153985361
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:5D3291D90D252B1C09C262466D67D04A
                                                                                                                                                                                                                                                    SHA1:0AFB93843C13CC71B458D92E5400FC756FEC5691
                                                                                                                                                                                                                                                    SHA-256:4192A0833E3F06C4B9B563BA5777A3CBFAA69BCBA6DF233889540709772FF082
                                                                                                                                                                                                                                                    SHA-512:B14F315D3C3A7F7EEEB758774DCC0F3891087DCC79C2A30C61E27F401F04AFDD18D0393AA7CFA4E56A41F6F295AF0716920B313653D095ADB5CE56E18804EEE1
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.PNG........IHDR.....................pHYs.................sRGB.........gAMA......a....JIDATx..}p..}.b......l.`...cp.p..$....M...$...6.I.o...i...N.f...L.G.M..8.f...0..,$1..........3.X....=.s........+..~f4..=.y?.w~..9.i.c.Q'..B.<2..'..B.."A-..B...j!..".HP.!..9F.Z.!..1..B.!D....B.!r....B..c$...B..#A-..B...j!..".HP.!..9F.Z.!..1..B.!D....B.!r....B..c$...B..#A-..B...j!..".HP.!..9F.Z.!..1..B.!D....B.!r....B..c$...B..#A-..B...j!..".HP.!..9F.Z.!..17...2........&wS.m..^..r..x......kC/9!..b..r..m... ..=.GA@g.j..7...I`.!..I..RP..y.k.....^....kCn.....wB.!..`...E.q9.}......q-7..z._Z|.......T0o.....7...~......+.n....Y.q.+.5....IW.O..~o.....Y...].Y....v.....~w..{.../..?..g..y...?...x..g...'....zA...o...7o..........R......W)...k........._..[{....|..?..?.Y..?......O.`.{<..j..dtt.......Q-...c_..S.Zz<G.R?.so.....H...}.I..o}....cuiy......_y.}...s---..O~5..g.wB.Q.......k..z@X.....t..._.qn.]w.A..D..<......@.,.=....>.v.u.{.....s...4..ou.>......7....o.-.X.Tz.....
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (4855), with no line terminators
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):4855
                                                                                                                                                                                                                                                    Entropy (8bit):5.8206860415984005
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:0E2712F1EE1D255EA6F941BA78A1C27F
                                                                                                                                                                                                                                                    SHA1:F239B5AB65A75E95B1F60144C07823F257113C10
                                                                                                                                                                                                                                                    SHA-256:BB6713763731456B1063BE3D4B92A647CC065C9788C2E2DE5240BD7C7C2C0BB6
                                                                                                                                                                                                                                                    SHA-512:9A4DBABC74F98053201114939AF52D723D29502616BD642EC6970A857EA9909F64A8FE96C2C54755963A75D9B2E03567C34BE640E997AF5243219AAE63EC2E65
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730848410182&cv=11&fst=1730848410182&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101823848~101878899~101878944~101925629&u_w=1920&u_h=1080&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D00000000-0000-0000-0000-D05099DB2397%26_fcid%3D1730846226315208%26_winver%3D19042%26version%3Dfa.1092c&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&npa=0&pscdl=noapi&auid=726160546.1730848410&uaa=x86&uab=64&uafvl=Chromium%3B128.0.6613.120%7CNot%253BA%253DBrand%3B24.0.0.0%7CGoogle%2520Chrome%3B128.0.6613.120&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dgtag.config&rfmt=3&fmt=4
                                                                                                                                                                                                                                                    Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (4951), with no line terminators
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):4951
                                                                                                                                                                                                                                                    Entropy (8bit):5.841101966348778
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:29F2629DD81699143DC941C68F0D7584
                                                                                                                                                                                                                                                    SHA1:A1EE61A6580061F7CB824FCA61EC22B048A24F9A
                                                                                                                                                                                                                                                    SHA-256:B0C730D55C79B5B4C87F7D5A62B7C4A8E050BDA21EB5D3C87B185D1D6D8F08BC
                                                                                                                                                                                                                                                    SHA-512:2B31F748AF0391F85ACC38ECBED1A3A10E05D1E819D77D38AC00DF7314237521983F5B866F1C623ACE220AC73C9A9BC6EF04D49556FD0A26918A4F11E2DBF101
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730848410701&cv=11&fst=1730848410701&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101823848~101878899~101878944~101925629&u_w=1920&u_h=1080&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D00000000-0000-0000-0000-D05099DB2397%26_fcid%3D1730846226315208%26_winver%3D19042%26version%3Dfa.1092c&label=kTaFCIuq0YYZENL-l5kD&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&value=1&currency_code=USD&npa=0&pscdl=noapi&auid=726160546.1730848410&uaa=x86&uab=64&uafvl=Chromium%3B128.0.6613.120%7CNot%253BA%253DBrand%3B24.0.0.0%7CGoogle%2520Chrome%3B128.0.6613.120&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dconversion&rfmt=3&fmt=4
                                                                                                                                                                                                                                                    Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (14408)
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):438956
                                                                                                                                                                                                                                                    Entropy (8bit):5.62633765120606
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:F617303B3C37D09F24F98F0CAF56AEF1
                                                                                                                                                                                                                                                    SHA1:7E95A08DA323DF18BA34E2419A00A8D25CCEBDD7
                                                                                                                                                                                                                                                    SHA-256:1EF00A075F7C7F0139353DA35B6545269BE3E77D604B39D67234656D1D969119
                                                                                                                                                                                                                                                    SHA-512:5E35020F380AE8C9EACFE583BF61F462FF34A7C8BDB7AC17C1DA3E7E51C7C8BF96ED8BF440EB81141D1D554EC60E1596A145953C088D1992D6C127916D6E91D0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://www.googletagmanager.com/gtag/js?id=G-VFQWFX3X1C
                                                                                                                                                                                                                                                    Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"3",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_cross_domain","priority":39,"vtp_rules":["list","pcapp\\.store","pcappstore\\.download"],"tag_id":11},{"function":"__ogt_ga_send","priority":29,"vtp_value":true,"tag_id":13},{"function":"__ogt_referral_exclusion","priority":29,"vtp_includeConditions":["list","veryfast\\.io"],"tag_id":14},{"function":"__ogt_session_timeout","priority":29,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":15},{"function":"__ogt_1p_data_v2","priority":29,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionTy
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:HTML document, ASCII text, with very long lines (22117), with no line terminators
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):22117
                                                                                                                                                                                                                                                    Entropy (8bit):5.547023583219424
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:565EA4CBEB5BCF3ACA830B0996A3240F
                                                                                                                                                                                                                                                    SHA1:8681B9AEA6298F07DCC0F545FEE2418B40265211
                                                                                                                                                                                                                                                    SHA-256:CDF5949574DC8FA1D80C31DA1441EB03FBA59412F947A3EE6D8F2A94EC357373
                                                                                                                                                                                                                                                    SHA-512:864DF20437E64ED4B2FD7557BF52B6AE53EE3D9A6CCC8349A9C00C11D355A92B2D515C90C057B4434CED5207C65DDE88EBB1AF03DDB6EA5CC8D4521537FE6EF8
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://td.doubleclick.net/td/rul/858128210?random=1730848410197&cv=11&fst=1730848410197&fmt=3&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101823848~101878899~101878944~101925629&u_w=1920&u_h=1080&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D00000000-0000-0000-0000-D05099DB2397%26_fcid%3D1730846226315208%26_winver%3D19042%26version%3Dfa.1092c&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&npa=0&pscdl=noapi&auid=726160546.1730848410&uaa=x86&uab=64&uafvl=Chromium%3B128.0.6613.120%7CNot%253BA%253DBrand%3B24.0.0.0%7CGoogle%2520Chrome%3B128.0.6613.120&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dpage_view
                                                                                                                                                                                                                                                    Preview:<html><head><meta http-equiv="origin-trial" content="Avh5Ny0XEFCyQ7+oNieXskUrqY8edUzL5/XrwKlGjARQHW4TFRK+jVd5HnDIpY20n5OLHfgU4ku7x48N3uhG/A0AAABxeyJvcmlnaW4iOiJodHRwczovL2RvdWJsZWNsaWNrLm5ldDo0NDMiLCJmZWF0dXJlIjoiUHJpdmFjeVNhbmRib3hBZHNBUElzIiwiZXhwaXJ5IjoxNjk1MTY3OTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="></head><body><script>var ig_list={"interestGroups":[{"action":0,"expirationTimeInSeconds":5184000,"interestGroupAttributes":{"owner":"https://td.doubleclick.net","name":"4s726160546.1730848410","biddingLogicUrl":"https://td.doubleclick.net/td/bjs","dailyUpdateUrl":"https://td.doubleclick.net/td/update?ig_name=4s726160546.1730848410\u0026ig_key=1sNHM3MjYxNjA1NDYuMTczMDg0ODQxMA!2sZ3nAmw!3sAAptDV6QhexN","trustedBiddingSignalsUrl":"https://td.doubleclick.net/td/bts","trustedBiddingSignalsKeys":["1sLxPI_g!2sZ3nAmw!3sAAptDV6QhexN"],"userBiddingSignals":[["7904705661","7900466892","7896384790","475816165","596093288","7904283812"],null,1730848411602188],"ads":[{"renderUrl":"https://tdsf.doubleclick.
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (5552)
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):80097
                                                                                                                                                                                                                                                    Entropy (8bit):5.340756849336266
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:18B2A701734EE01149C8C6721BE2EEEB
                                                                                                                                                                                                                                                    SHA1:149DFCA2FDF66D1EE9CA29BDCBA984719FC4FAFF
                                                                                                                                                                                                                                                    SHA-256:A4B1DB472A3CF2E3EAB7AFA9AD6DA36115BA144166668AF8E097C65E50BD2D06
                                                                                                                                                                                                                                                    SHA-512:048CA68548BA7DF2DD26D18A75008977F63F2CB42428B47BB09BEF69A76673B4087B5B1F5289A3946C988103D4E3A1326BE8253443BB75BB8F62372160F60518
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://connect.facebook.net/signals/config/2010038472609365?v=2.9.176&r=stable&domain=veryfast.io&hme=872f04a0547459b3285cb03b0d7a47bfde40628f4b386809918a621e2688602f&ex_m=70%2C121%2C107%2C111%2C61%2C4%2C100%2C69%2C16%2C97%2C89%2C51%2C54%2C172%2C175%2C187%2C183%2C184%2C186%2C29%2C101%2C53%2C77%2C185%2C167%2C170%2C180%2C181%2C188%2C131%2C41%2C189%2C190%2C34%2C143%2C15%2C50%2C195%2C194%2C133%2C18%2C40%2C1%2C43%2C65%2C66%2C67%2C71%2C93%2C17%2C14%2C96%2C92%2C91%2C108%2C52%2C110%2C39%2C109%2C30%2C94%2C26%2C168%2C171%2C140%2C86%2C56%2C84%2C33%2C73%2C0%2C95%2C32%2C28%2C82%2C83%2C88%2C47%2C46%2C87%2C37%2C11%2C12%2C13%2C6%2C7%2C25%2C22%2C23%2C57%2C62%2C64%2C75%2C102%2C27%2C76%2C9%2C8%2C80%2C48%2C21%2C104%2C103%2C105%2C98%2C10%2C20%2C3%2C38%2C74%2C19%2C5%2C90%2C81%2C44%2C35%2C85%2C2%2C36%2C63%2C42%2C106%2C45%2C79%2C68%2C112%2C60%2C59%2C31%2C99%2C58%2C55%2C49%2C78%2C72%2C24%2C113
                                                                                                                                                                                                                                                    Preview:/**.* Copyright (c) 2017-present, Facebook, Inc. All rights reserved..*.* You are hereby granted a non-exclusive, worldwide, royalty-free license to use,.* copy, modify, and distribute this software in source code or binary form for use.* in connection with the web services and APIs provided by Facebook..*.* As with any software that integrates with the Facebook platform, your use of.* this software is subject to the Facebook Platform Policy.* [http://developers.facebook.com/policy/]. This copyright notice shall be.* included in all copies or substantial portions of the software..*.* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS.* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR.* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER.* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN.* CONNECTION WI
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (14408)
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):438982
                                                                                                                                                                                                                                                    Entropy (8bit):5.6263766297212605
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:EAA18EBC51E0A8C5915AB4952EC5EB36
                                                                                                                                                                                                                                                    SHA1:673C1EBD709A9E2178D97DE5EE320DDFF6F3BA1D
                                                                                                                                                                                                                                                    SHA-256:A1D0ED25EA5BFE2745F44E7E3E2DBD6621072B402631F1EBABF446217DBC722E
                                                                                                                                                                                                                                                    SHA-512:A6AADD865BBA169FCCF170B79C0728542CABAA763A820A33EB99DADF73990E5837BEF34375B14E1D2A65770493CAE5201CE11504252C24EF32553ED3B4112C99
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"3",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_cross_domain","priority":39,"vtp_rules":["list","pcapp\\.store","pcappstore\\.download"],"tag_id":11},{"function":"__ogt_ga_send","priority":29,"vtp_value":true,"tag_id":13},{"function":"__ogt_referral_exclusion","priority":29,"vtp_includeConditions":["list","veryfast\\.io"],"tag_id":14},{"function":"__ogt_session_timeout","priority":29,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":15},{"function":"__ogt_1p_data_v2","priority":29,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionTy
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):3592
                                                                                                                                                                                                                                                    Entropy (8bit):4.71780114350715
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:0FFC071BC5AF33D2BE224CF147670471
                                                                                                                                                                                                                                                    SHA1:5A7FC912A47D0531B2C95BFCB6BEAAA2248E0779
                                                                                                                                                                                                                                                    SHA-256:1923EFD4718E21B882410106B6FEF7FA35C3EB2EC3C2338CD8DFF07108F25C1F
                                                                                                                                                                                                                                                    SHA-512:205AF4B98312AB012BE7D7C25AC0A6D91D11C77DC3E29A9D6CC80F96A97577826079469AF16F88FE214CF0A17C70261C4AAA671FBB19EF214B91776BC3683353
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://repository.pcapp.store/pcapp/images/front_img/lp/lpd_installing_r2/img/done_cursor_icon.svg
                                                                                                                                                                                                                                                    Preview:<svg width="107" height="109" viewBox="0 0 107 109" fill="none" xmlns="http://www.w3.org/2000/svg"><g filter="url(#filter0_d_539_286)"><path d="M78.856 41.614c.048-.048.096-.048.096-.096.048-.048.048-.096.048-.143v-.192c0-.096-.048-.144-.096-.24a.84.84 0 00-.191-.239c-.048-.096-.144-.143-.24-.191-.096-.048-.191-.144-.287-.192L31.16 17.144c-.096-.048-.144-.048-.24-.096S30.777 17 30.68 17h-.574c-.096 0-.144.048-.191.096-.048.048-.096.048-.144.096-.048.047-.048.095-.096.143L28 23.8v.191l7.853 43.29c0 .144.048.24.144.336.048.096.144.191.24.287.095.096.191.192.335.24.096.047.24.143.383.143.048 0 .048 0 .096.048h.622s.048 0 .048-.048c0 0 .048 0 .048-.048h.048s.048 0 .048-.047h.048l.048-.048.047-.048 10.153-14.27L63.1 70.537l.048.048s.048 0 .048.048l.048.048s.048.048.096.048h.096c.047 0 .047.047.095.047s.048.048.096.048h.863c.048 0 .048 0 .096-.047.048 0 .048-.048.096-.048l8.476-5.986 4.214-5.603c.048-.048.048-.096.096-.144 0-.048.047-.096.047-.144v-.191c0-.048-.047-.144-.047-.192a.363.363 0
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (3969)
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):290586
                                                                                                                                                                                                                                                    Entropy (8bit):5.559350913994766
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:A58BCC8FEA3E3EBEBADF2AD3623D722E
                                                                                                                                                                                                                                                    SHA1:A9F6F8F7FE43D78E43DB5321969CB313EEE06840
                                                                                                                                                                                                                                                    SHA-256:79CE98097D5987992F6A040AA2411E87E12BF1BC68C4632D0688E79804F868F3
                                                                                                                                                                                                                                                    SHA-512:A02018FDC2AF5CA65EBAF2552AC714B424051971D05C02CAC5579C347644C02995B2CD97CE620AA4861875B36B8AE73AF368FEA51B23067728B22CEEEBC00823
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"2",. . "macros":[{"function":"__e"}],. "tags":[{"function":"__ogt_ads_datatos","priority":16,"vtp_instanceDestinationId":"AW-858128210","tag_id":16},{"function":"__ogt_cps","priority":6,"vtp_cpsMode":"ALL","tag_id":8},{"function":"__ogt_1p_data_v2","priority":6,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionType":"CSS_SELECTOR","vtp_autoEmailEnabled":true,"vtp_postalCodeValue":"","vtp_lastNameValue":"","vtp_phoneType":"CSS_SELECTOR","vtp_phoneValue":"","vtp_streetType":"CSS_SELECTOR","vtp_autoPhoneEnabled":false,"vtp_postalCodeType":"CSS_SELECTOR","vtp_emailValue":"","vtp_firstNameValue":"","vtp_streetValue":"","vtp_
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (3969)
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):290586
                                                                                                                                                                                                                                                    Entropy (8bit):5.559350913994766
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:A58BCC8FEA3E3EBEBADF2AD3623D722E
                                                                                                                                                                                                                                                    SHA1:A9F6F8F7FE43D78E43DB5321969CB313EEE06840
                                                                                                                                                                                                                                                    SHA-256:79CE98097D5987992F6A040AA2411E87E12BF1BC68C4632D0688E79804F868F3
                                                                                                                                                                                                                                                    SHA-512:A02018FDC2AF5CA65EBAF2552AC714B424051971D05C02CAC5579C347644C02995B2CD97CE620AA4861875B36B8AE73AF368FEA51B23067728B22CEEEBC00823
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://www.googletagmanager.com/gtag/js?id=AW-858128210
                                                                                                                                                                                                                                                    Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"2",. . "macros":[{"function":"__e"}],. "tags":[{"function":"__ogt_ads_datatos","priority":16,"vtp_instanceDestinationId":"AW-858128210","tag_id":16},{"function":"__ogt_cps","priority":6,"vtp_cpsMode":"ALL","tag_id":8},{"function":"__ogt_1p_data_v2","priority":6,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionType":"CSS_SELECTOR","vtp_autoEmailEnabled":true,"vtp_postalCodeValue":"","vtp_lastNameValue":"","vtp_phoneType":"CSS_SELECTOR","vtp_phoneValue":"","vtp_streetType":"CSS_SELECTOR","vtp_autoPhoneEnabled":false,"vtp_postalCodeType":"CSS_SELECTOR","vtp_emailValue":"","vtp_firstNameValue":"","vtp_streetValue":"","vtp_
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3592
                                                                                                                                                                                                                                                    Entropy (8bit):4.71780114350715
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:0FFC071BC5AF33D2BE224CF147670471
                                                                                                                                                                                                                                                    SHA1:5A7FC912A47D0531B2C95BFCB6BEAAA2248E0779
                                                                                                                                                                                                                                                    SHA-256:1923EFD4718E21B882410106B6FEF7FA35C3EB2EC3C2338CD8DFF07108F25C1F
                                                                                                                                                                                                                                                    SHA-512:205AF4B98312AB012BE7D7C25AC0A6D91D11C77DC3E29A9D6CC80F96A97577826079469AF16F88FE214CF0A17C70261C4AAA671FBB19EF214B91776BC3683353
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="107" height="109" viewBox="0 0 107 109" fill="none" xmlns="http://www.w3.org/2000/svg"><g filter="url(#filter0_d_539_286)"><path d="M78.856 41.614c.048-.048.096-.048.096-.096.048-.048.048-.096.048-.143v-.192c0-.096-.048-.144-.096-.24a.84.84 0 00-.191-.239c-.048-.096-.144-.143-.24-.191-.096-.048-.191-.144-.287-.192L31.16 17.144c-.096-.048-.144-.048-.24-.096S30.777 17 30.68 17h-.574c-.096 0-.144.048-.191.096-.048.048-.096.048-.144.096-.048.047-.048.095-.096.143L28 23.8v.191l7.853 43.29c0 .144.048.24.144.336.048.096.144.191.24.287.095.096.191.192.335.24.096.047.24.143.383.143.048 0 .048 0 .096.048h.622s.048 0 .048-.048c0 0 .048 0 .048-.048h.048s.048 0 .048-.047h.048l.048-.048.047-.048 10.153-14.27L63.1 70.537l.048.048s.048 0 .048.048l.048.048s.048.048.096.048h.096c.047 0 .047.047.095.047s.048.048.096.048h.863c.048 0 .048 0 .096-.047.048 0 .048-.048.096-.048l8.476-5.986 4.214-5.603c.048-.048.048-.096.096-.144 0-.048.047-.096.047-.144v-.191c0-.048-.047-.144-.047-.192a.363.363 0
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (14408)
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):438982
                                                                                                                                                                                                                                                    Entropy (8bit):5.626460645536282
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:D1F24548996A1FE866F751DB40E560B4
                                                                                                                                                                                                                                                    SHA1:49E335BB785A0DE019C0538C6B5B2674BF4E6994
                                                                                                                                                                                                                                                    SHA-256:85CC07D8CF97A66466B656F4048543F7244B6C61899932CE12A872E1450536F7
                                                                                                                                                                                                                                                    SHA-512:D67051962BE92AE108E1BF2553063E6841F5E10B9A31430B66173831041666F5E1E427565A78CF96D4F8C2364AA49552F5EE3F47BA506232C2A81F4A4596C71A
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://www.googletagmanager.com/gtag/js?id=G-VFQWFX3X1C&l=dataLayer&cx=c
                                                                                                                                                                                                                                                    Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"3",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_cross_domain","priority":39,"vtp_rules":["list","pcapp\\.store","pcappstore\\.download"],"tag_id":11},{"function":"__ogt_ga_send","priority":29,"vtp_value":true,"tag_id":13},{"function":"__ogt_referral_exclusion","priority":29,"vtp_includeConditions":["list","veryfast\\.io"],"tag_id":14},{"function":"__ogt_session_timeout","priority":29,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":15},{"function":"__ogt_1p_data_v2","priority":29,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionTy
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (1572)
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):5973
                                                                                                                                                                                                                                                    Entropy (8bit):5.385847419693263
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:207F621B4209616283D091A5A0F8CD49
                                                                                                                                                                                                                                                    SHA1:D34E96207B74C7446771ED458DDB74AE78121E93
                                                                                                                                                                                                                                                    SHA-256:5780DCB011235F74EBD060A2E1D7E214E3BD12E13982BF4BD7FBE052D3D55F63
                                                                                                                                                                                                                                                    SHA-512:91EA88B5F95863ABBB93E69AF3D7F68BD0D5C3716C5294869A64D5C08C573DA8FE1695279B397D7E7765431863013AC7AFB6DA00559C49AA49E6D4E87580C306
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://fonts.googleapis.com/css?family=Open%20Sans
                                                                                                                                                                                                                                                    Preview:/* cyrillic-ext */.@font-face {. font-family: 'Open Sans';. font-style: normal;. font-weight: 400;. font-stretch: 100%;. src: url(https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4taVIGxA.woff2) format('woff2');. unicode-range: U+0460-052F, U+1C80-1C8A, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F;.}./* cyrillic */.@font-face {. font-family: 'Open Sans';. font-style: normal;. font-weight: 400;. font-stretch: 100%;. src: url(https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4kaVIGxA.woff2) format('woff2');. unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116;.}./* greek-ext */.@font-face {. font-family: 'Open Sans';. font-style: normal;. font-weight: 400;. font-stretch: 100%;. src: url(https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4saVIGxA.woff2) format('woff2');. unicode-range: U+1F00-1FFF;.}./* greek */.@font-fa
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (9217)
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):244295
                                                                                                                                                                                                                                                    Entropy (8bit):5.454185343611895
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:B5322CFCA51C69074051C6B148CE5A6C
                                                                                                                                                                                                                                                    SHA1:A995F0F78FE3147A4BF3D0503F9A123FDDAD0CD0
                                                                                                                                                                                                                                                    SHA-256:55270971FDC4172D5CBBA95DADD779074EADB9C50BF16C2B3253CCC6BC8FC363
                                                                                                                                                                                                                                                    SHA-512:9D1824E860609AF7AB2775ACE28D22DED11D4678B89351B34BC03A54527D7C3029238DE45C126E52150B9A87F9242039679F3A646A2F5C7E46D66EE19BB051BE
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://connect.facebook.net/en_US/fbevents.js
                                                                                                                                                                                                                                                    Preview:/**.* Copyright (c) 2017-present, Facebook, Inc. All rights reserved..*.* You are hereby granted a non-exclusive, worldwide, royalty-free license to use,.* copy, modify, and distribute this software in source code or binary form for use.* in connection with the web services and APIs provided by Facebook..*.* As with any software that integrates with the Facebook platform, your use of.* this software is subject to the Facebook Platform Policy.* [http://developers.facebook.com/policy/]. This copyright notice shall be.* included in all copies or substantial portions of the software..*.* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS.* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR.* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER.* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN.* CONNECTION WI
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):675
                                                                                                                                                                                                                                                    Entropy (8bit):7.606800268124855
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8D1ED092B3BE364DC47574F1310D2C87
                                                                                                                                                                                                                                                    SHA1:D5BBA623B5AFB4C5B6C0AD5ED04A10F1881DA595
                                                                                                                                                                                                                                                    SHA-256:07B61E98466A1F851D5DCF555AD9B901684EE622275129B98C38DA3785506FF2
                                                                                                                                                                                                                                                    SHA-512:70134A9B5B786473A56F11BA7098CA6AF568EEF97AA8704A9748A5EFDFC4F16CEE1F9C22CEA9F55660BE4FEB14D6C1B5B09A7C76076D4F813A58FECF27BB8828
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.PNG........IHDR... ... .....szz....jIDATx..VKK.Q....R."..q.....Z.|.P....."b..'.......XiE..B6.6Z.c4.8....nf.$Nf&^. d1.w..9'.*..$.(.2N.V.|.&....g...8.E.%].y.G_$8...O.H..4....%..>.N...P.....K..V9Z..4f..Y.,..T.pGi.%.?8.,@..W.'q...g...}p8....y.5r.......)......&....(.WrD_V.er.).h.....t....c~sN..u&S....Z.m|.n..c.-_.A....(...._....X....,.hBD..<Z..Yk.V..._7V...U.........;....'....F..>;B..8.^.f../.:.. a?]..\.l......&@dD.g..y.r.p.g....fG<......M...r.....c..,...FJ,W...2G...d.9Q.4..5{4D...,._Oe.......Csbw.M~......dU.........j.0W.....r...'.s6..S......n...E...V@..e.$V....rfeN7.I...z+..`..R.,.N.]...>z..i#.*.~b.....N'..~0go.].*....I.e.x........[.S......IEND.B`.
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (4871), with no line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4871
                                                                                                                                                                                                                                                    Entropy (8bit):5.827549163562027
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:9A229150E80FF370917C744A7948CB54
                                                                                                                                                                                                                                                    SHA1:9D18370A0CCA3E561039FDA7AB969E7CB5D5310B
                                                                                                                                                                                                                                                    SHA-256:73C36ECBA88849062A2D6871602D21C397197B679CADEEA33547053A7C54A69A
                                                                                                                                                                                                                                                    SHA-512:F51B4829C5911B20FE6CFB9C7B55EEF8E57237C5DC9AC9F1606D12197B643BE261658CF9AE1AB978203EF7606C6BAF256A53B26F0660AB3FE08DB2CCC6D7FBAF
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:Web Open Font Format (Version 2), TrueType, length 48444, version 1.0
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):48444
                                                                                                                                                                                                                                                    Entropy (8bit):7.995593685409469
                                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8E433C0592F77BEB6DC527D7B90BE120
                                                                                                                                                                                                                                                    SHA1:D7402416753AE1BB4CBD4B10D33A0C10517838BD
                                                                                                                                                                                                                                                    SHA-256:F052EE44C3728DFD23ABA8A4567150BC314D23903026FBB6AD089422C2DF56AF
                                                                                                                                                                                                                                                    SHA-512:5E90F48B923BB95AEB49691D03DADE8825C119B2FA28977EA170C41548900F4E0165E2869F97C7A9380D7FF8FF331A1DA855500E5F7B0DFD2B9ABD77A386BBF3
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa1ZL7.woff2
                                                                                                                                                                                                                                                    Preview:wOF2.......<.......l..............................`...\..p?HVAR.m?MVAR^.`?STAT.N'&..>/l........>....0....6.$.... ........[..A.2v.6......$..e...w"../.L.p:......Tpc..8@.[5......d#d.xw..o.O3-.....%..>...%..)~p.K.J.H..S...s..z..Wa.. 0\..J.....BL;V..-.L...j....^.9..HO l..,.*.6.v....?....x.....m..;....a![zif...Ur...Q..P.&.I1..:n.p...j~..h...9.!....@.<.bl|.Y?h..B.j/..rH.S%/~.^D...6..D.4G...y....Y.....=/o..W..5ryo.d?.gA]..?...1V..S......7ZJ...f....mBG[0eW....y..%B}..]? ...,sR<.y~.~.}.%.!..,X.....`...R..^....S.....u*.?k.v.k..U.u..M..`!...b!..X)P...y{.........n..T+6...R......L...x}...g...].g"WT.b..h ....X...=;{w...QO.s..w..@.(,..........{.........1..@...(...\.......9*..2.h9P.G........K.Dp...F..4W..ui.u...G...s..x7.?..tg..D..O.sA..t.t.4..~..e\...X.....T..kf.qfX..=^_....g"....De...x[J..A..).G.YUhR.....0.l..#&3.'.K..*...........$I.Pp.../.s.<@...r=..S......d..P.S.B.w.~X..ZK....h J.`A.bv,=.....>1.Ev.^..U.A. ....EU..].........dw..!$.A`..B.._.....Z~..!..J..l]r.m}m..
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):2118
                                                                                                                                                                                                                                                    Entropy (8bit):4.907323279161229
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:1039640CF0666A1621D55C9E9FA81439
                                                                                                                                                                                                                                                    SHA1:A7E6A6AB233DAE1776506F2E6C7FD03E46E83EA9
                                                                                                                                                                                                                                                    SHA-256:4455C2A26901C4D348E194B06B06908C155E6459CF5987984D03848E30964F0C
                                                                                                                                                                                                                                                    SHA-512:F9324B6C58C51DC3F24BD242EADA7E5565B60E12863EC13F28D883028791AEC7EC5E324298FA0427AD1CD45BDD7260FF0295DC171F24DD0AC3F0203FB6CD0706
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:<svg width="132" height="132" viewBox="0 0 132 132" fill="none" xmlns="http://www.w3.org/2000/svg"><g filter="url(#filter0_d_539_279)"><path d="M16 12.5A4.5 4.5 0 0120.5 8h91a4.5 4.5 0 014.5 4.5v91a4.5 4.5 0 01-4.5 4.5h-91a4.5 4.5 0 01-4.5-4.5v-91z" fill="#fff"/></g><path d="M81.894 54.233H67.64c-.913 0-.913 0-.913-.865V32.733c0-.865 0-.845.85-.966 3.341-.463 6.661-.946 10.002-1.41 3.839-.543 7.657-1.066 11.496-1.59 2.345-.322 4.69-.664 7.014-.986 1.037-.14 1.037-.14 1.037.866v24.6c0 .986 0 .986-1.016.986H81.894zm.021 5.841h14.422c.767 0 .767 0 .767.765v24.963c0 .845 0 .865-.871.745-3.32-.463-6.64-.947-9.94-1.41-2.282-.322-4.586-.624-6.868-.946-2.801-.382-5.603-.785-8.404-1.187-1.204-.161-2.386-.363-3.59-.484-.54-.06-.705-.261-.705-.764.02-4.067.02-8.113.02-12.18v-8.898c0-.463.146-.604.623-.604 4.814.02 9.69 0 14.546 0zm-34.175.001h12.243c.705 0 .705 0 .705.704v19.669c0 .825-.041.825-.892.704-2.47-.342-4.918-.684-7.387-1.026-2.158-.303-4.316-.625-6.454-.927-2.448-.342-4.897-.664-7.345-
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:HTML document, ASCII text, with very long lines (22117), with no line terminators
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):22117
                                                                                                                                                                                                                                                    Entropy (8bit):5.5471072251715325
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:3C6828288C7C775D8411899E6249317F
                                                                                                                                                                                                                                                    SHA1:84986D9A17D44D81772AE63CBA2EA4D97AE42B89
                                                                                                                                                                                                                                                    SHA-256:0BADF48EE0B79DBB87F7B90466958DA131C349CFBF03869D55278C1093F88C8F
                                                                                                                                                                                                                                                    SHA-512:A503FE6E54B61DDB735FD676EC1E1A6226F89FAEAC64988C3533F1F86E2C26B10599AAE26D5D563A05F1533E68E09731B1469E10D4447640929F478D653C9C13
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://td.doubleclick.net/td/rul/858128210?random=1730848410182&cv=11&fst=1730848410182&fmt=3&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101823848~101878899~101878944~101925629&u_w=1920&u_h=1080&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D00000000-0000-0000-0000-D05099DB2397%26_fcid%3D1730846226315208%26_winver%3D19042%26version%3Dfa.1092c&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&npa=0&pscdl=noapi&auid=726160546.1730848410&uaa=x86&uab=64&uafvl=Chromium%3B128.0.6613.120%7CNot%253BA%253DBrand%3B24.0.0.0%7CGoogle%2520Chrome%3B128.0.6613.120&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dgtag.config
                                                                                                                                                                                                                                                    Preview:<html><head><meta http-equiv="origin-trial" content="Avh5Ny0XEFCyQ7+oNieXskUrqY8edUzL5/XrwKlGjARQHW4TFRK+jVd5HnDIpY20n5OLHfgU4ku7x48N3uhG/A0AAABxeyJvcmlnaW4iOiJodHRwczovL2RvdWJsZWNsaWNrLm5ldDo0NDMiLCJmZWF0dXJlIjoiUHJpdmFjeVNhbmRib3hBZHNBUElzIiwiZXhwaXJ5IjoxNjk1MTY3OTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="></head><body><script>var ig_list={"interestGroups":[{"action":0,"expirationTimeInSeconds":5184000,"interestGroupAttributes":{"owner":"https://td.doubleclick.net","name":"4s726160546.1730848410","biddingLogicUrl":"https://td.doubleclick.net/td/bjs","dailyUpdateUrl":"https://td.doubleclick.net/td/update?ig_name=4s726160546.1730848410\u0026ig_key=1sNHM3MjYxNjA1NDYuMTczMDg0ODQxMA!2sZ3nAmw!3sAAptDV6QhexN","trustedBiddingSignalsUrl":"https://td.doubleclick.net/td/bts","trustedBiddingSignalsKeys":["1sLxPI_g!2sZ3nAmw!3sAAptDV6QhexN"],"userBiddingSignals":[["596093288","7904283812","7900466892","7896384790","7904705661","475816165"],null,1730848411603089],"ads":[{"renderUrl":"https://tdsf.doubleclick.
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):2499
                                                                                                                                                                                                                                                    Entropy (8bit):5.4636477793325495
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:382991778933FB8F5697DEB2EE26A0ED
                                                                                                                                                                                                                                                    SHA1:6CDED0C76F01EA3C3C6DB8128B5CF59063A92C78
                                                                                                                                                                                                                                                    SHA-256:0919FF36779EEF85FA50AF4B94FB2D496A765612B7C5EDD31BA69EA1F4136736
                                                                                                                                                                                                                                                    SHA-512:FC05BAFD9EB747B7060B8C730E8A467CFD0A0311622B325E5EB74A1083D3A7B8897396CF4FE310E7567EAA1B5A951AB3906F57E57671F2852A18ED1AD0E7E2C9
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://fonts.googleapis.com/css2?family=Inter:wght@100..900&display=swap
                                                                                                                                                                                                                                                    Preview:/* cyrillic-ext */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100 900;. font-display: swap;. src: url(https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa2JL7SUc.woff2) format('woff2');. unicode-range: U+0460-052F, U+1C80-1C8A, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F;.}./* cyrillic */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100 900;. font-display: swap;. src: url(https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa0ZL7SUc.woff2) format('woff2');. unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116;.}./* greek-ext */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100 900;. font-display: swap;. src: url(https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa2ZL7SUc.woff2) format('woff2');. unicode-range: U+1F00-1FFF;.}./* greek */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100 900;. f
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (4970), with no line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4970
                                                                                                                                                                                                                                                    Entropy (8bit):5.849631651028046
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:765105D2FCF806105364C3E0A9C4F3B5
                                                                                                                                                                                                                                                    SHA1:48E02F548545B32BC0484F27D5C9F00B7FCB7966
                                                                                                                                                                                                                                                    SHA-256:E7DB2F58BD703CCC2062F47567A68A3884EB278E1ED4B1B5C70F60168AC234AE
                                                                                                                                                                                                                                                    SHA-512:58B5DD511EDFF878DC5A9C1EA7AE3B72582602D4FFABD0EDE2F5AF3017B909407C42BCF4892FE18D44054BC73CB7521BA3E80805C4E159EE3040A205A77FE162
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):675
                                                                                                                                                                                                                                                    Entropy (8bit):7.606800268124855
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8D1ED092B3BE364DC47574F1310D2C87
                                                                                                                                                                                                                                                    SHA1:D5BBA623B5AFB4C5B6C0AD5ED04A10F1881DA595
                                                                                                                                                                                                                                                    SHA-256:07B61E98466A1F851D5DCF555AD9B901684EE622275129B98C38DA3785506FF2
                                                                                                                                                                                                                                                    SHA-512:70134A9B5B786473A56F11BA7098CA6AF568EEF97AA8704A9748A5EFDFC4F16CEE1F9C22CEA9F55660BE4FEB14D6C1B5B09A7C76076D4F813A58FECF27BB8828
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://repository.pcapp.store/pcapp/images/fast.png
                                                                                                                                                                                                                                                    Preview:.PNG........IHDR... ... .....szz....jIDATx..VKK.Q....R."..q.....Z.|.P....."b..'.......XiE..B6.6Z.c4.8....nf.$Nf&^. d1.w..9'.*..$.(.2N.V.|.&....g...8.E.%].y.G_$8...O.H..4....%..>.N...P.....K..V9Z..4f..Y.,..T.pGi.%.?8.,@..W.'q...g...}p8....y.5r.......)......&....(.WrD_V.er.).h.....t....c~sN..u&S....Z.m|.n..c.-_.A....(...._....X....,.hBD..<Z..Yk.V..._7V...U.........;....'....F..>;B..8.^.f../.:.. a?]..\.l......&@dD.g..y.r.p.g....fG<......M...r.....c..,...FJ,W...2G...d.9Q.4..5{4D...,._Oe.......Csbw.M~......dU.........j.0W.....r...'.s6..S......n...E...V@..e.$V....rfeN7.I...z+..`..R.,.N.]...>z..i#.*.~b.....N'..~0go.].*....I.e.x........[.S......IEND.B`.
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:HTML document, ASCII text, with very long lines (815)
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):3501
                                                                                                                                                                                                                                                    Entropy (8bit):5.383873370647921
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:147FD3B00C22BA9C939712E9213C24CA
                                                                                                                                                                                                                                                    SHA1:3B48369B86FA0574F35379AACD1F42CC9C98A52B
                                                                                                                                                                                                                                                    SHA-256:70F5B11C1870CF90201A6D5F770CA318A3FA5827C74A8765EDE22B487F7D4532
                                                                                                                                                                                                                                                    SHA-512:E8419A71232EDAC8FD131446777F7D034B3171EFE07B3267479B439E4982650DB65A0D1DDC9F516315D5ED1B01ECFD2F7EB55D75D44AA51EE0AD494D441586D2
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://www.googletagmanager.com/static/service_worker/4al0/sw_iframe.html?origin=https%3A%2F%2Fpcapp.store
                                                                                                                                                                                                                                                    Preview:<!DOCTYPE html>.<html>.<head>. <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon">.</head>.<body>. <script>.'use strict';class m{constructor(a){this.j=a;this.g={};this.h={};this.i=0;this.id=String(Math.floor(Number.MAX_SAFE_INTEGER*Math.random()))}}function n(a){return a.performance&&a.performance.now()||Date.now()}.var p=function(a,b){class d{constructor(c,g,f){this.failureType=c;this.data=g;this.g=f;this.h=new m(n(f))}s(c,g){const f=c.clientId;if(c.type===0){c.isDead=!0;var e=this.h,h=n(this.g);e.g[f]==null&&(e.g[f]=0,e.h[f]=h,e.i++);e.g[f]++;c.stats={targetId:e.id,clientCount:e.i,totalLifeMs:Math.round(h-e.j),heartbeatCount:e.g[f],clientLifeMs:Math.round(h-e.h[f])}}c.failure={failureType:this.failureType,data:this.data};g(c)}}return new d(5,a,b)};/*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/.let q=globalThis.trustedTypes,r;function t(){let a=null;if(!q)return a;try{const b=d=>d;a=q.createPolicy("goog#html",{createHTML:b,createScript:b,crea
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:HTML document, ASCII text, with very long lines (22131), with no line terminators
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):22131
                                                                                                                                                                                                                                                    Entropy (8bit):5.547962187148845
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:144954F45EC4237BF601A5D84FA768D7
                                                                                                                                                                                                                                                    SHA1:44E794BC2477F8A1C1DDE3F370031040119CE96E
                                                                                                                                                                                                                                                    SHA-256:08EEAFEE3F9614874A8E861BFE6AD7E486D4CA4ABB181F2FC34E11CC2D5192B8
                                                                                                                                                                                                                                                    SHA-512:1082B88B75AFF9CD014D906A52BCF70D3B7BBEC7D65AB7BBDDC65C34F703B12C97A7D88201107D63A5505AB0849ABC224C88180489DC503DA8EC172CFF53D719
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://td.doubleclick.net/td/rul/858128210?random=1730848410701&cv=11&fst=1730848410701&fmt=3&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101823848~101878899~101878944~101925629&u_w=1920&u_h=1080&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D00000000-0000-0000-0000-D05099DB2397%26_fcid%3D1730846226315208%26_winver%3D19042%26version%3Dfa.1092c&label=kTaFCIuq0YYZENL-l5kD&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&value=1&currency_code=USD&npa=0&pscdl=noapi&auid=726160546.1730848410&uaa=x86&uab=64&uafvl=Chromium%3B128.0.6613.120%7CNot%253BA%253DBrand%3B24.0.0.0%7CGoogle%2520Chrome%3B128.0.6613.120&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dconversion
                                                                                                                                                                                                                                                    Preview:<html><head><meta http-equiv="origin-trial" content="Avh5Ny0XEFCyQ7+oNieXskUrqY8edUzL5/XrwKlGjARQHW4TFRK+jVd5HnDIpY20n5OLHfgU4ku7x48N3uhG/A0AAABxeyJvcmlnaW4iOiJodHRwczovL2RvdWJsZWNsaWNrLm5ldDo0NDMiLCJmZWF0dXJlIjoiUHJpdmFjeVNhbmRib3hBZHNBUElzIiwiZXhwaXJ5IjoxNjk1MTY3OTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="></head><body><script>var ig_list={"interestGroups":[{"action":0,"expirationTimeInSeconds":31104000,"interestGroupAttributes":{"owner":"https://td.doubleclick.net","name":"4s726160546.1730848410","biddingLogicUrl":"https://td.doubleclick.net/td/bjs","dailyUpdateUrl":"https://td.doubleclick.net/td/update?ig_name=4s726160546.1730848410\u0026ig_key=1sNHM3MjYxNjA1NDYuMTczMDg0ODQxMA!2saQVCnA!3sAAptDV4QjZhC","trustedBiddingSignalsUrl":"https://td.doubleclick.net/td/bts","trustedBiddingSignalsKeys":["1sLxPI_g!2saQVCnA!3sAAptDV4QjZhC"],"userBiddingSignals":[["7900466892","7896384790","475816165","7904283812","7904705661","596093288","8552333481"],null,1730848412013120],"ads":[{"renderUrl":"https://tds
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:HTML document, ASCII text, with no line terminators
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):13
                                                                                                                                                                                                                                                    Entropy (8bit):2.7773627950641693
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:C83301425B2AD1D496473A5FF3D9ECCA
                                                                                                                                                                                                                                                    SHA1:941EFB7368E46B27B937D34B07FC4D41DA01B002
                                                                                                                                                                                                                                                    SHA-256:B633A587C652D02386C4F16F8C6F6AAB7352D97F16367C3C40576214372DD628
                                                                                                                                                                                                                                                    SHA-512:83BAFE4C888008AFDD1B72C028C7F50DEE651CA9E7D8E1B332E0BF3AA1315884155A1458A304F6E5C5627E714BF5A855A8B8D7DB3F4EB2BB2789FE2F8F6A1D83
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://td.doubleclick.net/td/ga/rul?tid=G-VFQWFX3X1C&gacid=1978406245.1730848410&gtm=45je4au0v898645365za200zb9103256652&dma=0&gcd=13l3l3l3l1l1&npa=0&pscdl=noapi&aip=1&fledge=1&frm=0&tag_exp=101823848~101878899~101878944~101925629&z=859615603
                                                                                                                                                                                                                                                    Preview:<html></html>
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (4871), with no line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4871
                                                                                                                                                                                                                                                    Entropy (8bit):5.836609773272614
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:9C935622B7E45363850BA8F5C4B66922
                                                                                                                                                                                                                                                    SHA1:5E2F485B94A26816E92E605B1CF27C6951BE3F37
                                                                                                                                                                                                                                                    SHA-256:96F5B8775C0C27A6162981186B8344B1F03B954043727928BF71869074141256
                                                                                                                                                                                                                                                    SHA-512:424665E31F62851AD95361430D1715267EFE8EA2A2FC81D43EB56E04F60D1561BA425E8EE7ED38F23CA1196CE9B0CDB82E25CA87C72F3E1F1F6DA27D271B9557
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:Web Open Font Format (Version 2), TrueType, length 18668, version 1.0
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):18668
                                                                                                                                                                                                                                                    Entropy (8bit):7.988119248989337
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8655D20BBCC8CDBFAB17B6BE6CF55DF3
                                                                                                                                                                                                                                                    SHA1:90EDBFA9A7DABB185487B4774076F82EB6412270
                                                                                                                                                                                                                                                    SHA-256:E7AF9D60D875EB1C1B1037BBBFDEC41FCB096D0EBCF98A48717AD8B07906CED6
                                                                                                                                                                                                                                                    SHA-512:47308DE25BD7E4CA27F59A2AE681BA64393FE4070E730C1F00C4053BAC956A9B4F7C0763C04145BC50A5F91C12A0BF80BDD4B03EECC2036CD56B2DB31494CBAF
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4gaVI.woff2
                                                                                                                                                                                                                                                    Preview:wOF2......H...........H..........................|.....h.`?STAT^..0..|...........+..2..6.$..`. ..x........z'o..w;....6.E....6....E...'$H.#.....n1X..JU/.d.O..JC.'J".v.v.l.h.....u.S...SY.....B.hz.o.}......W......%m6...A..=....\..m. .]..~.[..........]...I.*.h.=.....6.xt..F....Lt...Qs-.7..{...~BI.".F.Q......F...P..dMw..#I2........Rq.Q&.0@.;..;...3VG..:c.nki..-Q..2##e.u...8n....\?....T..b....^..#...../.J|OM..St....e.S.}!.....>..i.T/a.ES%.W.P3..`..a.R.A.....!~g..74.np8o.....d[6?.P.4)P.....AG.3.......;#0.y....M..O/2.@.4..N.vA$.:M&H,.AT".........@..a.~..L->...0@h...~.._..N"......t......C./g7..............2E.N.J...TW.F..."A.B...n.......i.?.{\.L.!*.B..x...S..!........?.\,... .@.....y"xw.A8.w..!E..-^P O..+.T.r.R.zz..K..].E.....Ri.)g.P...j..w..c.M.F.v../........Q....'...(....X..;.K.!BZ3.........f.....N.A(....cA`.b'...`.~sa*^.....?..../.L.S......t..`@h..C.....>N.W...;>..._h.+~=|......uOGA{.7.....h....q.d.4$.x<.....^0|...@....@Q[RC.0....b....'...*RID
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (14408)
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):438956
                                                                                                                                                                                                                                                    Entropy (8bit):5.626370108019169
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:30BA51F93EBCF57380432A9DCBD53681
                                                                                                                                                                                                                                                    SHA1:E843D574E0DA09EA93CCFDA3C165E8A066C6DC02
                                                                                                                                                                                                                                                    SHA-256:2147173E63A377A5F56FFAF795F4AC44A2BBC67A33D09071B471A9ACCB26365C
                                                                                                                                                                                                                                                    SHA-512:AB625BD7B1E83155D52885F73DE431FD0329584D50647C689CA0192AC086AC6BA52675817AB07CE6182C4E32E9EA9617BB122C3996DCAAEC1D56B1698F431A3E
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"3",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_cross_domain","priority":39,"vtp_rules":["list","pcapp\\.store","pcappstore\\.download"],"tag_id":11},{"function":"__ogt_ga_send","priority":29,"vtp_value":true,"tag_id":13},{"function":"__ogt_referral_exclusion","priority":29,"vtp_includeConditions":["list","veryfast\\.io"],"tag_id":14},{"function":"__ogt_session_timeout","priority":29,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":15},{"function":"__ogt_1p_data_v2","priority":29,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionTy
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (9217)
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):244295
                                                                                                                                                                                                                                                    Entropy (8bit):5.454185343611895
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:B5322CFCA51C69074051C6B148CE5A6C
                                                                                                                                                                                                                                                    SHA1:A995F0F78FE3147A4BF3D0503F9A123FDDAD0CD0
                                                                                                                                                                                                                                                    SHA-256:55270971FDC4172D5CBBA95DADD779074EADB9C50BF16C2B3253CCC6BC8FC363
                                                                                                                                                                                                                                                    SHA-512:9D1824E860609AF7AB2775ACE28D22DED11D4678B89351B34BC03A54527D7C3029238DE45C126E52150B9A87F9242039679F3A646A2F5C7E46D66EE19BB051BE
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:/**.* Copyright (c) 2017-present, Facebook, Inc. All rights reserved..*.* You are hereby granted a non-exclusive, worldwide, royalty-free license to use,.* copy, modify, and distribute this software in source code or binary form for use.* in connection with the web services and APIs provided by Facebook..*.* As with any software that integrates with the Facebook platform, your use of.* this software is subject to the Facebook Platform Policy.* [http://developers.facebook.com/policy/]. This copyright notice shall be.* included in all copies or substantial portions of the software..*.* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS.* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR.* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER.* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN.* CONNECTION WI
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (5552)
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):80097
                                                                                                                                                                                                                                                    Entropy (8bit):5.340756849336266
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:18B2A701734EE01149C8C6721BE2EEEB
                                                                                                                                                                                                                                                    SHA1:149DFCA2FDF66D1EE9CA29BDCBA984719FC4FAFF
                                                                                                                                                                                                                                                    SHA-256:A4B1DB472A3CF2E3EAB7AFA9AD6DA36115BA144166668AF8E097C65E50BD2D06
                                                                                                                                                                                                                                                    SHA-512:048CA68548BA7DF2DD26D18A75008977F63F2CB42428B47BB09BEF69A76673B4087B5B1F5289A3946C988103D4E3A1326BE8253443BB75BB8F62372160F60518
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:/**.* Copyright (c) 2017-present, Facebook, Inc. All rights reserved..*.* You are hereby granted a non-exclusive, worldwide, royalty-free license to use,.* copy, modify, and distribute this software in source code or binary form for use.* in connection with the web services and APIs provided by Facebook..*.* As with any software that integrates with the Facebook platform, your use of.* this software is subject to the Facebook Platform Policy.* [http://developers.facebook.com/policy/]. This copyright notice shall be.* included in all copies or substantial portions of the software..*.* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS.* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR.* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER.* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN.* CONNECTION WI
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (723)
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):7076
                                                                                                                                                                                                                                                    Entropy (8bit):5.52488676121649
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:88A2E0A522036C0B87E03552E56629AA
                                                                                                                                                                                                                                                    SHA1:EC9D1157518E753A84DBDE1333A29B34CF776D63
                                                                                                                                                                                                                                                    SHA-256:788AFB96F2DA68E8729EC35F3D5E381FAD3482D37C54C2195C7311440EE4C27E
                                                                                                                                                                                                                                                    SHA-512:44B953878BD650FE2BCC8B6904620955C3E396B7DC8F41F85D021A8E0404DA41DB15C5499A03F7D4FE9129BB340AA3F6782942CF5327502FD4569BEBBB17073F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://www.googletagmanager.com/static/service_worker/4al0/sw.js?origin=https%3A%2F%2Fpcapp.store
                                                                                                                                                                                                                                                    Preview:'use strict';var k=function(a){function b(c){return a.next(c)}function e(c){return a.throw(c)}return new Promise(function(c,d){function f(h){h.done?c(h.value):Promise.resolve(h.value).then(b,e).then(f,d)}f(a.next())})};/*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var m=this||self;var u,v;a:{for(var x=["CLOSURE_FLAGS"],B=m,C=0;C<x.length;C++)if(B=B[x[C]],B==null){v=null;break a}v=B}var G=v&&v[610401301];u=G!=null?G:!1;var H;const I=m.navigator;H=I?I.userAgentData||null:null;function J(a){return u?H?H.brands.some(({brand:b})=>b&&b.indexOf(a)!=-1):!1:!1}function K(a){var b;a:{const e=m.navigator;if(e){const c=e.userAgent;if(c){b=c;break a}}b=""}return b.indexOf(a)!=-1};function L(){return u?!!H&&H.brands.length>0:!1}function O(){return L()?J("Chromium"):(K("Chrome")||K("CriOS"))&&!(L()?0:K("Edge"))||K("Silk")};!K("Android")||O();O();!K("Safari")||O()||(L()?0:K("Coast"))||(L()?0:K("Opera"))||(L()?0:K("Edge"))||(L()?J("Microsoft Edge"):K("Edg/"))||L()&
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (4853), with no line terminators
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):4853
                                                                                                                                                                                                                                                    Entropy (8bit):5.825534904673833
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:8808849E1563F6A9D0807BB8CB38CB3B
                                                                                                                                                                                                                                                    SHA1:5F58EE2FEF9DACFAD3E9B38FDB6E8465DDCDB9C5
                                                                                                                                                                                                                                                    SHA-256:9C40BE614C00836D31B4CB8E82C8FB6DA82A80A421C91B955A60F878D7CB7B5C
                                                                                                                                                                                                                                                    SHA-512:4E8215FFF33016E6E62752AD6F99D3AE34FF44203EAC3215492C5993CEBA192AFC0D845F756FF51F08752610C02A61B8D931154F60501F19CA6D24E5A354A8BC
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730848410197&cv=11&fst=1730848410197&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101823848~101878899~101878944~101925629&u_w=1920&u_h=1080&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D00000000-0000-0000-0000-D05099DB2397%26_fcid%3D1730846226315208%26_winver%3D19042%26version%3Dfa.1092c&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&npa=0&pscdl=noapi&auid=726160546.1730848410&uaa=x86&uab=64&uafvl=Chromium%3B128.0.6613.120%7CNot%253BA%253DBrand%3B24.0.0.0%7CGoogle%2520Chrome%3B128.0.6613.120&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dpage_view&rfmt=3&fmt=4
                                                                                                                                                                                                                                                    Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                                                                                    Size (bytes):2118
                                                                                                                                                                                                                                                    Entropy (8bit):4.907323279161229
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:
                                                                                                                                                                                                                                                    MD5:1039640CF0666A1621D55C9E9FA81439
                                                                                                                                                                                                                                                    SHA1:A7E6A6AB233DAE1776506F2E6C7FD03E46E83EA9
                                                                                                                                                                                                                                                    SHA-256:4455C2A26901C4D348E194B06B06908C155E6459CF5987984D03848E30964F0C
                                                                                                                                                                                                                                                    SHA-512:F9324B6C58C51DC3F24BD242EADA7E5565B60E12863EC13F28D883028791AEC7EC5E324298FA0427AD1CD45BDD7260FF0295DC171F24DD0AC3F0203FB6CD0706
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    URL:https://repository.pcapp.store/pcapp/images/front_img/lp/lpd_installing_r2/img/done_windows_icon.svg
                                                                                                                                                                                                                                                    Preview:<svg width="132" height="132" viewBox="0 0 132 132" fill="none" xmlns="http://www.w3.org/2000/svg"><g filter="url(#filter0_d_539_279)"><path d="M16 12.5A4.5 4.5 0 0120.5 8h91a4.5 4.5 0 014.5 4.5v91a4.5 4.5 0 01-4.5 4.5h-91a4.5 4.5 0 01-4.5-4.5v-91z" fill="#fff"/></g><path d="M81.894 54.233H67.64c-.913 0-.913 0-.913-.865V32.733c0-.865 0-.845.85-.966 3.341-.463 6.661-.946 10.002-1.41 3.839-.543 7.657-1.066 11.496-1.59 2.345-.322 4.69-.664 7.014-.986 1.037-.14 1.037-.14 1.037.866v24.6c0 .986 0 .986-1.016.986H81.894zm.021 5.841h14.422c.767 0 .767 0 .767.765v24.963c0 .845 0 .865-.871.745-3.32-.463-6.64-.947-9.94-1.41-2.282-.322-4.586-.624-6.868-.946-2.801-.382-5.603-.785-8.404-1.187-1.204-.161-2.386-.363-3.59-.484-.54-.06-.705-.261-.705-.764.02-4.067.02-8.113.02-12.18v-8.898c0-.463.146-.604.623-.604 4.814.02 9.69 0 14.546 0zm-34.175.001h12.243c.705 0 .705 0 .705.704v19.669c0 .825-.041.825-.892.704-2.47-.342-4.918-.684-7.387-1.026-2.158-.303-4.316-.625-6.454-.927-2.448-.342-4.897-.664-7.345-
                                                                                                                                                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                                                                                                    Entropy (8bit):7.61274971005279
                                                                                                                                                                                                                                                    TrID:
                                                                                                                                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                    File name:Setup.exe
                                                                                                                                                                                                                                                    File size:190'056 bytes
                                                                                                                                                                                                                                                    MD5:6309770ca668239c93a093e885a362e2
                                                                                                                                                                                                                                                    SHA1:e6b1bafe8723468b1c191f46d2c0a21d61e896e6
                                                                                                                                                                                                                                                    SHA256:27c5187ed2c3272fadb508d182ca580e77161ed2699e53e39f151dc22cb89aef
                                                                                                                                                                                                                                                    SHA512:88ebe5f4a7bfd0962bbecdc5a88de32041acb8edbda6c61b1c7ed9ee4119a4f52ab607987d7547e3733660cced643b566511da82dacb727a942ed99f73ce93d5
                                                                                                                                                                                                                                                    SSDEEP:3072:UbG7N2kDTHUpouL4Ynd86Pzy5n+/mGCK8izuG2okB2h4l591BBgkXmUa:UbE/HUzRe6ry5nmQiiGz4z9TJXra
                                                                                                                                                                                                                                                    TLSH:1904F15056E0C862D8A28B71B5797F7B8AB5DC2192B45F8313107B187E7DE819F0E3A3
                                                                                                                                                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                                                                                                                                                                                                                                                    Icon Hash:45d44c7192498005
                                                                                                                                                                                                                                                    Entrypoint:0x40352d
                                                                                                                                                                                                                                                    Entrypoint Section:.text
                                                                                                                                                                                                                                                    Digitally signed:true
                                                                                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                                                                                    Subsystem:windows gui
                                                                                                                                                                                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                                                                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                    Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                                                                                                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                                                                                                    OS Version Major:4
                                                                                                                                                                                                                                                    OS Version Minor:0
                                                                                                                                                                                                                                                    File Version Major:4
                                                                                                                                                                                                                                                    File Version Minor:0
                                                                                                                                                                                                                                                    Subsystem Version Major:4
                                                                                                                                                                                                                                                    Subsystem Version Minor:0
                                                                                                                                                                                                                                                    Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                                                                                                                                                                                                                                                    Signature Valid:true
                                                                                                                                                                                                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                                                                                                                                                                                    Signature Validation Error:The operation completed successfully
                                                                                                                                                                                                                                                    Error Number:0
                                                                                                                                                                                                                                                    Not Before, Not After
                                                                                                                                                                                                                                                    • 08/05/2024 02:00:00 14/02/2025 00:59:59
                                                                                                                                                                                                                                                    Subject Chain
                                                                                                                                                                                                                                                    • CN=FAST CORPORATION LTD, O=FAST CORPORATION LTD, L=Ra'anana, C=IL, SERIALNUMBER=515636181, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=IL
                                                                                                                                                                                                                                                    Version:3
                                                                                                                                                                                                                                                    Thumbprint MD5:04786BD703B906E22AECB2AD38CE4D94
                                                                                                                                                                                                                                                    Thumbprint SHA-1:07BE42727905BE32C822A638502C1B8FAAE6540A
                                                                                                                                                                                                                                                    Thumbprint SHA-256:FDB017BB88E5D453E22A73810690C72534F58EFB109EA0D4494EC393F2307DBC
                                                                                                                                                                                                                                                    Serial:0E5C655E1CBE9A8879372F58A5BC0302
                                                                                                                                                                                                                                                    Instruction
                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                    sub esp, 000003F4h
                                                                                                                                                                                                                                                    push ebx
                                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                                    push edi
                                                                                                                                                                                                                                                    push 00000020h
                                                                                                                                                                                                                                                    pop edi
                                                                                                                                                                                                                                                    xor ebx, ebx
                                                                                                                                                                                                                                                    push 00008001h
                                                                                                                                                                                                                                                    mov dword ptr [ebp-14h], ebx
                                                                                                                                                                                                                                                    mov dword ptr [ebp-04h], 0040A2E0h
                                                                                                                                                                                                                                                    mov dword ptr [ebp-10h], ebx
                                                                                                                                                                                                                                                    call dword ptr [004080CCh]
                                                                                                                                                                                                                                                    mov esi, dword ptr [004080D0h]
                                                                                                                                                                                                                                                    lea eax, dword ptr [ebp-00000140h]
                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                    mov dword ptr [ebp-0000012Ch], ebx
                                                                                                                                                                                                                                                    mov dword ptr [ebp-2Ch], ebx
                                                                                                                                                                                                                                                    mov dword ptr [ebp-28h], ebx
                                                                                                                                                                                                                                                    mov dword ptr [ebp-00000140h], 0000011Ch
                                                                                                                                                                                                                                                    call esi
                                                                                                                                                                                                                                                    test eax, eax
                                                                                                                                                                                                                                                    jne 00007FE1CCDB28EAh
                                                                                                                                                                                                                                                    lea eax, dword ptr [ebp-00000140h]
                                                                                                                                                                                                                                                    mov dword ptr [ebp-00000140h], 00000114h
                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                    call esi
                                                                                                                                                                                                                                                    mov ax, word ptr [ebp-0000012Ch]
                                                                                                                                                                                                                                                    mov ecx, dword ptr [ebp-00000112h]
                                                                                                                                                                                                                                                    sub ax, 00000053h
                                                                                                                                                                                                                                                    add ecx, FFFFFFD0h
                                                                                                                                                                                                                                                    neg ax
                                                                                                                                                                                                                                                    sbb eax, eax
                                                                                                                                                                                                                                                    mov byte ptr [ebp-26h], 00000004h
                                                                                                                                                                                                                                                    not eax
                                                                                                                                                                                                                                                    and eax, ecx
                                                                                                                                                                                                                                                    mov word ptr [ebp-2Ch], ax
                                                                                                                                                                                                                                                    cmp dword ptr [ebp-0000013Ch], 0Ah
                                                                                                                                                                                                                                                    jnc 00007FE1CCDB28BAh
                                                                                                                                                                                                                                                    and word ptr [ebp-00000132h], 0000h
                                                                                                                                                                                                                                                    mov eax, dword ptr [ebp-00000134h]
                                                                                                                                                                                                                                                    movzx ecx, byte ptr [ebp-00000138h]
                                                                                                                                                                                                                                                    mov dword ptr [00434FB8h], eax
                                                                                                                                                                                                                                                    xor eax, eax
                                                                                                                                                                                                                                                    mov ah, byte ptr [ebp-0000013Ch]
                                                                                                                                                                                                                                                    movzx eax, ax
                                                                                                                                                                                                                                                    or eax, ecx
                                                                                                                                                                                                                                                    xor ecx, ecx
                                                                                                                                                                                                                                                    mov ch, byte ptr [ebp-2Ch]
                                                                                                                                                                                                                                                    movzx ecx, cx
                                                                                                                                                                                                                                                    shl eax, 10h
                                                                                                                                                                                                                                                    or eax, ecx
                                                                                                                                                                                                                                                    Programming Language:
                                                                                                                                                                                                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x4f40.rsrc
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x2bd000x2968.data
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                    .text0x10000x68970x6a00ce9df19df15aa7bfbc0a8d0af0b841d0False0.6661261792452831data6.458398214928006IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    .rdata0x80000x14a60x1600a118375c929d970903c1204233b7583dFalse0.4392755681818182data5.024109281264143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    .data0xa0000x2b0180x60082a10c59a8679bb952fc8316070b8a6cFalse0.521484375data4.15458210408643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                    .ndata0x360000x360000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                    .rsrc0x6c0000x4f400x50006147c56de0951034d77b52b0075b790fFalse0.1015625data2.760740823683962IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                    RT_ICON0x6c2080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2834 x 2834 px/mEnglishUnited States0.036372224846480866
                                                                                                                                                                                                                                                    RT_DIALOG0x704300x202dataEnglishUnited States0.4085603112840467
                                                                                                                                                                                                                                                    RT_DIALOG0x706380xf8dataEnglishUnited States0.6290322580645161
                                                                                                                                                                                                                                                    RT_DIALOG0x707300xa0dataEnglishUnited States0.60625
                                                                                                                                                                                                                                                    RT_DIALOG0x707d00xeedataEnglishUnited States0.6302521008403361
                                                                                                                                                                                                                                                    RT_GROUP_ICON0x708c00x14dataEnglishUnited States1.1
                                                                                                                                                                                                                                                    RT_VERSION0x708d80x240dataEnglishUnited States0.4895833333333333
                                                                                                                                                                                                                                                    RT_MANIFEST0x70b180x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States0.5127478753541076
                                                                                                                                                                                                                                                    DLLImport
                                                                                                                                                                                                                                                    ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                                                                                                                                                                                                                                    SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                                                                                                                                                                                                                                    ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                                                                                                                                                                                                                                    COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                                                                                                                                                                                                                    USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                                                                                                                                                                                                                                    GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                                                                                                                                                                                                                    KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                                                                                                                                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                    EnglishUnited States
                                                                                                                                                                                                                                                    Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                    Target ID:0
                                                                                                                                                                                                                                                    Start time:18:13:19
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\Setup.exe"
                                                                                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                                                                                    File size:190'056 bytes
                                                                                                                                                                                                                                                    MD5 hash:6309770CA668239C93A093E885A362E2
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:1
                                                                                                                                                                                                                                                    Start time:18:13:25
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=00000000-0000-0000-0000-D05099DB2397&winver=19042&version=fa.1092c&nocache=20241105181325.34&_fcid=1730846226315208
                                                                                                                                                                                                                                                    Imagebase:0x7ff636550000
                                                                                                                                                                                                                                                    File size:2'742'376 bytes
                                                                                                                                                                                                                                                    MD5 hash:BB7C48CDDDE076E7EB44022520F40F77
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:2
                                                                                                                                                                                                                                                    Start time:18:13:26
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-subproc-heap-profiling --field-trial-handle=2176,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2212 /prefetch:3
                                                                                                                                                                                                                                                    Imagebase:0x7ff636550000
                                                                                                                                                                                                                                                    File size:2'742'376 bytes
                                                                                                                                                                                                                                                    MD5 hash:BB7C48CDDDE076E7EB44022520F40F77
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:3
                                                                                                                                                                                                                                                    Start time:18:13:29
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                                                                                    Imagebase:0x7ff773220000
                                                                                                                                                                                                                                                    File size:57'360 bytes
                                                                                                                                                                                                                                                    MD5 hash:F586835082F632DC8D9404D83BC16316
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:4
                                                                                                                                                                                                                                                    Start time:18:13:29
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                                                                                                                    Imagebase:0x7ff773220000
                                                                                                                                                                                                                                                    File size:57'360 bytes
                                                                                                                                                                                                                                                    MD5 hash:F586835082F632DC8D9404D83BC16316
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:5
                                                                                                                                                                                                                                                    Start time:18:13:30
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=4844,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5408 /prefetch:8
                                                                                                                                                                                                                                                    Imagebase:0x7ff636550000
                                                                                                                                                                                                                                                    File size:2'742'376 bytes
                                                                                                                                                                                                                                                    MD5 hash:BB7C48CDDDE076E7EB44022520F40F77
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:6
                                                                                                                                                                                                                                                    Start time:18:13:30
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=5204,i,11907367456306388257,12963148072136716127,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5196 /prefetch:8
                                                                                                                                                                                                                                                    Imagebase:0x7ff636550000
                                                                                                                                                                                                                                                    File size:2'742'376 bytes
                                                                                                                                                                                                                                                    MD5 hash:BB7C48CDDDE076E7EB44022520F40F77
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:7
                                                                                                                                                                                                                                                    Start time:18:13:36
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\nsy2C04.tmp
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force
                                                                                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                                                                                    File size:93'386'616 bytes
                                                                                                                                                                                                                                                    MD5 hash:84EE733F8014D22DAD2DFEF725489980
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                                                                                                    • Detection: 42%, ReversingLabs
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:8
                                                                                                                                                                                                                                                    Start time:18:14:07
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Users\user\PCAppStore\PcAppStore.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Users\user\PCAppStore\PcAppStore.exe" /init default
                                                                                                                                                                                                                                                    Imagebase:0x7ff64b8a0000
                                                                                                                                                                                                                                                    File size:3'116'888 bytes
                                                                                                                                                                                                                                                    MD5 hash:4B88D8ADA8D22622C30D581FC38EAA52
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                                                                                                    • Detection: 8%, ReversingLabs
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:9
                                                                                                                                                                                                                                                    Start time:18:14:07
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Users\user\PCAppStore\Watchdog.exe" /guid=00000000-0000-0000-0000-D05099DB2397 /rid=20241105181407.1816081953 /ver=fa.1092c
                                                                                                                                                                                                                                                    Imagebase:0x7ff733c50000
                                                                                                                                                                                                                                                    File size:276'312 bytes
                                                                                                                                                                                                                                                    MD5 hash:11F3801CB9FF046D6075F681971C4EB8
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                                                                                                    • Detection: 5%, ReversingLabs
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:10
                                                                                                                                                                                                                                                    Start time:18:14:07
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\explorer.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:C:\Windows\Explorer.EXE
                                                                                                                                                                                                                                                    Imagebase:0x7ff7187c0000
                                                                                                                                                                                                                                                    File size:4'849'904 bytes
                                                                                                                                                                                                                                                    MD5 hash:5EA66FF5AE5612F921BC9DA23BAC95F7
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:12
                                                                                                                                                                                                                                                    Start time:18:14:12
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:14
                                                                                                                                                                                                                                                    Start time:18:14:13
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:15
                                                                                                                                                                                                                                                    Start time:18:14:13
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:16
                                                                                                                                                                                                                                                    Start time:18:14:13
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:17
                                                                                                                                                                                                                                                    Start time:18:14:14
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:18
                                                                                                                                                                                                                                                    Start time:18:14:14
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:19
                                                                                                                                                                                                                                                    Start time:18:14:14
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:20
                                                                                                                                                                                                                                                    Start time:18:14:15
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:21
                                                                                                                                                                                                                                                    Start time:18:14:15
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:22
                                                                                                                                                                                                                                                    Start time:18:14:15
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:23
                                                                                                                                                                                                                                                    Start time:18:14:15
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:24
                                                                                                                                                                                                                                                    Start time:18:14:16
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:25
                                                                                                                                                                                                                                                    Start time:18:14:16
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:26
                                                                                                                                                                                                                                                    Start time:18:14:16
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:27
                                                                                                                                                                                                                                                    Start time:18:14:17
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:28
                                                                                                                                                                                                                                                    Start time:18:14:17
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:29
                                                                                                                                                                                                                                                    Start time:18:14:17
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:30
                                                                                                                                                                                                                                                    Start time:18:14:17
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:31
                                                                                                                                                                                                                                                    Start time:18:14:18
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Users\user\PCAppStore\PcAppStore.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Users\user\PCAppStore\PCAppStore.exe" /init default
                                                                                                                                                                                                                                                    Imagebase:0x7ff64b8a0000
                                                                                                                                                                                                                                                    File size:3'116'888 bytes
                                                                                                                                                                                                                                                    MD5 hash:4B88D8ADA8D22622C30D581FC38EAA52
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:32
                                                                                                                                                                                                                                                    Start time:18:14:18
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:33
                                                                                                                                                                                                                                                    Start time:18:14:18
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:34
                                                                                                                                                                                                                                                    Start time:18:14:19
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:35
                                                                                                                                                                                                                                                    Start time:18:14:19
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:36
                                                                                                                                                                                                                                                    Start time:18:14:20
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:37
                                                                                                                                                                                                                                                    Start time:18:14:20
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:38
                                                                                                                                                                                                                                                    Start time:18:14:20
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:39
                                                                                                                                                                                                                                                    Start time:18:14:20
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:40
                                                                                                                                                                                                                                                    Start time:18:14:20
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:41
                                                                                                                                                                                                                                                    Start time:18:14:21
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:42
                                                                                                                                                                                                                                                    Start time:18:14:21
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:43
                                                                                                                                                                                                                                                    Start time:18:14:21
                                                                                                                                                                                                                                                    Start date:05/11/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\bXseErgRACaHGFcFYIDMCELjOMSOHhEoXkoqJAUxIIBZImRURAEAGqCWcQqhvVYUWGZsWSwwH\tddPFIUbTNWNQ.exe"
                                                                                                                                                                                                                                                    Imagebase:0xa70000
                                                                                                                                                                                                                                                    File size:140'800 bytes
                                                                                                                                                                                                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Reset < >

                                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                                      Execution Coverage:28.9%
                                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                      Signature Coverage:16.6%
                                                                                                                                                                                                                                                      Total number of Nodes:1349
                                                                                                                                                                                                                                                      Total number of Limit Nodes:40
                                                                                                                                                                                                                                                      execution_graph 2924 4015c1 2943 402da6 2924->2943 2928 401631 2930 401663 2928->2930 2931 401636 2928->2931 2933 401423 24 API calls 2930->2933 2970 401423 2931->2970 2940 40165b 2933->2940 2938 40164a SetCurrentDirectoryW 2938->2940 2939 401617 GetFileAttributesW 2941 4015d1 2939->2941 2941->2928 2941->2939 2955 405e39 2941->2955 2959 405b08 2941->2959 2962 405a6e CreateDirectoryW 2941->2962 2967 405aeb CreateDirectoryW 2941->2967 2944 402db2 2943->2944 2974 40657a 2944->2974 2947 4015c8 2949 405eb7 CharNextW CharNextW 2947->2949 2950 405ed4 2949->2950 2954 405ee6 2949->2954 2951 405ee1 CharNextW 2950->2951 2950->2954 2952 405f0a 2951->2952 2952->2941 2953 405e39 CharNextW 2953->2954 2954->2952 2954->2953 2956 405e3f 2955->2956 2957 405e55 2956->2957 2958 405e46 CharNextW 2956->2958 2957->2941 2958->2956 3012 40690a GetModuleHandleA 2959->3012 2963 405abb 2962->2963 2964 405abf GetLastError 2962->2964 2963->2941 2964->2963 2965 405ace SetFileSecurityW 2964->2965 2965->2963 2966 405ae4 GetLastError 2965->2966 2966->2963 2968 405afb 2967->2968 2969 405aff GetLastError 2967->2969 2968->2941 2969->2968 3021 40559f 2970->3021 2973 40653d lstrcpynW 2973->2938 2978 406587 2974->2978 2975 4067aa 2976 402dd3 2975->2976 3007 40653d lstrcpynW 2975->3007 2976->2947 2991 4067c4 2976->2991 2978->2975 2979 406778 lstrlenW 2978->2979 2982 40657a 10 API calls 2978->2982 2983 40668f GetSystemDirectoryW 2978->2983 2985 4066a2 GetWindowsDirectoryW 2978->2985 2986 406719 lstrcatW 2978->2986 2987 40657a 10 API calls 2978->2987 2988 4067c4 5 API calls 2978->2988 2989 4066d1 SHGetSpecialFolderLocation 2978->2989 3000 40640b 2978->3000 3005 406484 wsprintfW 2978->3005 3006 40653d lstrcpynW 2978->3006 2979->2978 2982->2979 2983->2978 2985->2978 2986->2978 2987->2978 2988->2978 2989->2978 2990 4066e9 SHGetPathFromIDListW CoTaskMemFree 2989->2990 2990->2978 2997 4067d1 2991->2997 2992 406847 2993 40684c CharPrevW 2992->2993 2995 40686d 2992->2995 2993->2992 2994 40683a CharNextW 2994->2992 2994->2997 2995->2947 2996 405e39 CharNextW 2996->2997 2997->2992 2997->2994 2997->2996 2998 406826 CharNextW 2997->2998 2999 406835 CharNextW 2997->2999 2998->2997 2999->2994 3008 4063aa 3000->3008 3003 40646f 3003->2978 3004 40643f RegQueryValueExW RegCloseKey 3004->3003 3005->2978 3006->2978 3007->2976 3009 4063b9 3008->3009 3010 4063c2 RegOpenKeyExW 3009->3010 3011 4063bd 3009->3011 3010->3011 3011->3003 3011->3004 3013 406930 GetProcAddress 3012->3013 3014 406926 3012->3014 3016 405b0f 3013->3016 3018 40689a GetSystemDirectoryW 3014->3018 3016->2941 3017 40692c 3017->3013 3017->3016 3019 4068bc wsprintfW LoadLibraryExW 3018->3019 3019->3017 3022 4055ba 3021->3022 3023 401431 3021->3023 3024 4055d6 lstrlenW 3022->3024 3025 40657a 17 API calls 3022->3025 3023->2973 3026 4055e4 lstrlenW 3024->3026 3027 4055ff 3024->3027 3025->3024 3026->3023 3028 4055f6 lstrcatW 3026->3028 3029 405612 3027->3029 3030 405605 SetWindowTextW 3027->3030 3028->3027 3029->3023 3031 405618 SendMessageW SendMessageW SendMessageW 3029->3031 3030->3029 3031->3023 3032 401941 3033 401943 3032->3033 3034 402da6 17 API calls 3033->3034 3035 401948 3034->3035 3038 405c49 3035->3038 3074 405f14 3038->3074 3041 405c71 DeleteFileW 3072 401951 3041->3072 3042 405c88 3043 405da8 3042->3043 3088 40653d lstrcpynW 3042->3088 3043->3072 3106 406873 FindFirstFileW 3043->3106 3045 405cae 3046 405cc1 3045->3046 3047 405cb4 lstrcatW 3045->3047 3089 405e58 lstrlenW 3046->3089 3049 405cc7 3047->3049 3051 405cd7 lstrcatW 3049->3051 3053 405ce2 lstrlenW FindFirstFileW 3049->3053 3051->3053 3053->3043 3065 405d04 3053->3065 3056 405d8b FindNextFileW 3060 405da1 FindClose 3056->3060 3056->3065 3057 405c01 5 API calls 3059 405de3 3057->3059 3061 405de7 3059->3061 3062 405dfd 3059->3062 3060->3043 3066 40559f 24 API calls 3061->3066 3061->3072 3064 40559f 24 API calls 3062->3064 3064->3072 3065->3056 3067 405c49 60 API calls 3065->3067 3069 40559f 24 API calls 3065->3069 3071 40559f 24 API calls 3065->3071 3093 40653d lstrcpynW 3065->3093 3094 405c01 3065->3094 3102 4062fd MoveFileExW 3065->3102 3068 405df4 3066->3068 3067->3065 3070 4062fd 36 API calls 3068->3070 3069->3056 3070->3072 3071->3065 3112 40653d lstrcpynW 3074->3112 3076 405f25 3077 405eb7 4 API calls 3076->3077 3078 405f2b 3077->3078 3079 405c69 3078->3079 3080 4067c4 5 API calls 3078->3080 3079->3041 3079->3042 3086 405f3b 3080->3086 3081 405f6c lstrlenW 3082 405f77 3081->3082 3081->3086 3084 405e0c 3 API calls 3082->3084 3083 406873 2 API calls 3083->3086 3085 405f7c GetFileAttributesW 3084->3085 3085->3079 3086->3079 3086->3081 3086->3083 3087 405e58 2 API calls 3086->3087 3087->3081 3088->3045 3090 405e66 3089->3090 3091 405e78 3090->3091 3092 405e6c CharPrevW 3090->3092 3091->3049 3092->3090 3092->3091 3093->3065 3113 406008 GetFileAttributesW 3094->3113 3097 405c2e 3097->3065 3098 405c24 DeleteFileW 3100 405c2a 3098->3100 3099 405c1c RemoveDirectoryW 3099->3100 3100->3097 3101 405c3a SetFileAttributesW 3100->3101 3101->3097 3103 406311 3102->3103 3105 40631e 3102->3105 3116 406183 3103->3116 3105->3065 3107 405dcd 3106->3107 3108 406889 FindClose 3106->3108 3107->3072 3109 405e0c lstrlenW CharPrevW 3107->3109 3108->3107 3110 405dd7 3109->3110 3111 405e28 lstrcatW 3109->3111 3110->3057 3111->3110 3112->3076 3114 405c0d 3113->3114 3115 40601a SetFileAttributesW 3113->3115 3114->3097 3114->3098 3114->3099 3115->3114 3117 4061b3 3116->3117 3118 4061d9 GetShortPathNameW 3116->3118 3143 40602d GetFileAttributesW CreateFileW 3117->3143 3120 4062f8 3118->3120 3121 4061ee 3118->3121 3120->3105 3121->3120 3123 4061f6 wsprintfA 3121->3123 3122 4061bd CloseHandle GetShortPathNameW 3122->3120 3124 4061d1 3122->3124 3125 40657a 17 API calls 3123->3125 3124->3118 3124->3120 3126 40621e 3125->3126 3144 40602d GetFileAttributesW CreateFileW 3126->3144 3128 40622b 3128->3120 3129 40623a GetFileSize GlobalAlloc 3128->3129 3130 4062f1 CloseHandle 3129->3130 3131 40625c 3129->3131 3130->3120 3145 4060b0 ReadFile 3131->3145 3136 40627b lstrcpyA 3139 40629d 3136->3139 3137 40628f 3138 405f92 4 API calls 3137->3138 3138->3139 3140 4062d4 SetFilePointer 3139->3140 3152 4060df WriteFile 3140->3152 3143->3122 3144->3128 3146 4060ce 3145->3146 3146->3130 3147 405f92 lstrlenA 3146->3147 3148 405fd3 lstrlenA 3147->3148 3149 405fdb 3148->3149 3150 405fac lstrcmpiA 3148->3150 3149->3136 3149->3137 3150->3149 3151 405fca CharNextA 3150->3151 3151->3148 3153 4060fd GlobalFree 3152->3153 3153->3130 3168 401c43 3169 402d84 17 API calls 3168->3169 3170 401c4a 3169->3170 3171 402d84 17 API calls 3170->3171 3172 401c57 3171->3172 3173 401c6c 3172->3173 3174 402da6 17 API calls 3172->3174 3175 401c7c 3173->3175 3176 402da6 17 API calls 3173->3176 3174->3173 3177 401cd3 3175->3177 3178 401c87 3175->3178 3176->3175 3180 402da6 17 API calls 3177->3180 3179 402d84 17 API calls 3178->3179 3182 401c8c 3179->3182 3181 401cd8 3180->3181 3183 402da6 17 API calls 3181->3183 3184 402d84 17 API calls 3182->3184 3185 401ce1 FindWindowExW 3183->3185 3186 401c98 3184->3186 3189 401d03 3185->3189 3187 401cc3 SendMessageW 3186->3187 3188 401ca5 SendMessageTimeoutW 3186->3188 3187->3189 3188->3189 3834 404943 3835 404953 3834->3835 3836 404979 3834->3836 3837 404499 18 API calls 3835->3837 3838 404500 8 API calls 3836->3838 3839 404960 SetDlgItemTextW 3837->3839 3840 404985 3838->3840 3839->3836 3841 4028c4 3842 4028ca 3841->3842 3843 4028d2 FindClose 3842->3843 3844 402c2a 3842->3844 3843->3844 3848 4016cc 3849 402da6 17 API calls 3848->3849 3850 4016d2 GetFullPathNameW 3849->3850 3851 4016ec 3850->3851 3857 40170e 3850->3857 3854 406873 2 API calls 3851->3854 3851->3857 3852 401723 GetShortPathNameW 3853 402c2a 3852->3853 3855 4016fe 3854->3855 3855->3857 3858 40653d lstrcpynW 3855->3858 3857->3852 3857->3853 3858->3857 3859 401e4e GetDC 3860 402d84 17 API calls 3859->3860 3861 401e60 GetDeviceCaps MulDiv ReleaseDC 3860->3861 3862 402d84 17 API calls 3861->3862 3863 401e91 3862->3863 3864 40657a 17 API calls 3863->3864 3865 401ece CreateFontIndirectW 3864->3865 3866 402638 3865->3866 3867 4045cf lstrcpynW lstrlenW 3868 402950 3869 402da6 17 API calls 3868->3869 3871 40295c 3869->3871 3870 402972 3873 406008 2 API calls 3870->3873 3871->3870 3872 402da6 17 API calls 3871->3872 3872->3870 3874 402978 3873->3874 3896 40602d GetFileAttributesW CreateFileW 3874->3896 3876 402985 3877 402a3b 3876->3877 3878 4029a0 GlobalAlloc 3876->3878 3879 402a23 3876->3879 3880 402a42 DeleteFileW 3877->3880 3881 402a55 3877->3881 3878->3879 3882 4029b9 3878->3882 3883 4032b4 31 API calls 3879->3883 3880->3881 3897 4034e5 SetFilePointer 3882->3897 3885 402a30 CloseHandle 3883->3885 3885->3877 3886 4029bf 3887 4034cf ReadFile 3886->3887 3888 4029c8 GlobalAlloc 3887->3888 3889 4029d8 3888->3889 3890 402a0c 3888->3890 3891 4032b4 31 API calls 3889->3891 3892 4060df WriteFile 3890->3892 3895 4029e5 3891->3895 3893 402a18 GlobalFree 3892->3893 3893->3879 3894 402a03 GlobalFree 3894->3890 3895->3894 3896->3876 3897->3886 3898 401956 3899 402da6 17 API calls 3898->3899 3900 40195d lstrlenW 3899->3900 3901 402638 3900->3901 3902 4014d7 3903 402d84 17 API calls 3902->3903 3904 4014dd Sleep 3903->3904 3906 402c2a 3904->3906 3617 4020d8 3618 4020ea 3617->3618 3628 40219c 3617->3628 3619 402da6 17 API calls 3618->3619 3621 4020f1 3619->3621 3620 401423 24 API calls 3626 4022f6 3620->3626 3622 402da6 17 API calls 3621->3622 3623 4020fa 3622->3623 3624 402110 LoadLibraryExW 3623->3624 3625 402102 GetModuleHandleW 3623->3625 3627 402121 3624->3627 3624->3628 3625->3624 3625->3627 3637 406979 3627->3637 3628->3620 3631 402132 3634 401423 24 API calls 3631->3634 3635 402142 3631->3635 3632 40216b 3633 40559f 24 API calls 3632->3633 3633->3635 3634->3635 3635->3626 3636 40218e FreeLibrary 3635->3636 3636->3626 3642 40655f WideCharToMultiByte 3637->3642 3639 406996 3640 40699d GetProcAddress 3639->3640 3641 40212c 3639->3641 3640->3641 3641->3631 3641->3632 3642->3639 3907 404658 3908 404670 3907->3908 3914 40478a 3907->3914 3915 404499 18 API calls 3908->3915 3909 4047f4 3910 4048be 3909->3910 3911 4047fe GetDlgItem 3909->3911 3916 404500 8 API calls 3910->3916 3912 404818 3911->3912 3913 40487f 3911->3913 3912->3913 3920 40483e SendMessageW LoadCursorW SetCursor 3912->3920 3913->3910 3921 404891 3913->3921 3914->3909 3914->3910 3917 4047c5 GetDlgItem SendMessageW 3914->3917 3918 4046d7 3915->3918 3919 4048b9 3916->3919 3940 4044bb KiUserCallbackDispatcher 3917->3940 3923 404499 18 API calls 3918->3923 3944 404907 3920->3944 3926 4048a7 3921->3926 3927 404897 SendMessageW 3921->3927 3924 4046e4 CheckDlgButton 3923->3924 3938 4044bb KiUserCallbackDispatcher 3924->3938 3926->3919 3931 4048ad SendMessageW 3926->3931 3927->3926 3928 4047ef 3941 4048e3 3928->3941 3931->3919 3933 404702 GetDlgItem 3939 4044ce SendMessageW 3933->3939 3935 404718 SendMessageW 3936 404735 GetSysColor 3935->3936 3937 40473e SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3935->3937 3936->3937 3937->3919 3938->3933 3939->3935 3940->3928 3942 4048f1 3941->3942 3943 4048f6 SendMessageW 3941->3943 3942->3943 3943->3909 3947 405b63 ShellExecuteExW 3944->3947 3946 40486d LoadCursorW SetCursor 3946->3913 3947->3946 3948 402b59 3949 402b60 3948->3949 3950 402bab 3948->3950 3953 402d84 17 API calls 3949->3953 3956 402ba9 3949->3956 3951 40690a 5 API calls 3950->3951 3952 402bb2 3951->3952 3954 402da6 17 API calls 3952->3954 3955 402b6e 3953->3955 3957 402bbb 3954->3957 3958 402d84 17 API calls 3955->3958 3957->3956 3959 402bbf IIDFromString 3957->3959 3961 402b7a 3958->3961 3959->3956 3960 402bce 3959->3960 3960->3956 3966 40653d lstrcpynW 3960->3966 3965 406484 wsprintfW 3961->3965 3964 402beb CoTaskMemFree 3964->3956 3965->3956 3966->3964 3760 40175c 3761 402da6 17 API calls 3760->3761 3762 401763 3761->3762 3763 40605c 2 API calls 3762->3763 3764 40176a 3763->3764 3765 40605c 2 API calls 3764->3765 3765->3764 3967 401d5d 3968 402d84 17 API calls 3967->3968 3969 401d6e SetWindowLongW 3968->3969 3970 402c2a 3969->3970 3766 4056de 3767 405888 3766->3767 3768 4056ff GetDlgItem GetDlgItem GetDlgItem 3766->3768 3770 405891 GetDlgItem CreateThread CloseHandle 3767->3770 3771 4058b9 3767->3771 3811 4044ce SendMessageW 3768->3811 3770->3771 3814 405672 5 API calls 3770->3814 3773 4058e4 3771->3773 3775 4058d0 ShowWindow ShowWindow 3771->3775 3776 405909 3771->3776 3772 40576f 3780 405776 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3772->3780 3774 405944 3773->3774 3777 4058f8 3773->3777 3778 40591e ShowWindow 3773->3778 3774->3776 3787 405952 SendMessageW 3774->3787 3813 4044ce SendMessageW 3775->3813 3779 404500 8 API calls 3776->3779 3782 404472 SendMessageW 3777->3782 3783 405930 3778->3783 3784 40593e 3778->3784 3792 405917 3779->3792 3785 4057e4 3780->3785 3786 4057c8 SendMessageW SendMessageW 3780->3786 3782->3776 3788 40559f 24 API calls 3783->3788 3789 404472 SendMessageW 3784->3789 3790 4057f7 3785->3790 3791 4057e9 SendMessageW 3785->3791 3786->3785 3787->3792 3793 40596b CreatePopupMenu 3787->3793 3788->3784 3789->3774 3795 404499 18 API calls 3790->3795 3791->3790 3794 40657a 17 API calls 3793->3794 3796 40597b AppendMenuW 3794->3796 3797 405807 3795->3797 3798 405998 GetWindowRect 3796->3798 3799 4059ab TrackPopupMenu 3796->3799 3800 405810 ShowWindow 3797->3800 3801 405844 GetDlgItem SendMessageW 3797->3801 3798->3799 3799->3792 3802 4059c6 3799->3802 3803 405833 3800->3803 3804 405826 ShowWindow 3800->3804 3801->3792 3805 40586b SendMessageW SendMessageW 3801->3805 3806 4059e2 SendMessageW 3802->3806 3812 4044ce SendMessageW 3803->3812 3804->3803 3805->3792 3806->3806 3807 4059ff OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3806->3807 3809 405a24 SendMessageW 3807->3809 3809->3809 3810 405a4d GlobalUnlock SetClipboardData CloseClipboard 3809->3810 3810->3792 3811->3772 3812->3801 3813->3773 3815 401ede 3816 402d84 17 API calls 3815->3816 3817 401ee4 3816->3817 3818 402d84 17 API calls 3817->3818 3819 401ef0 3818->3819 3820 401f07 EnableWindow 3819->3820 3821 401efc ShowWindow 3819->3821 3822 402c2a 3820->3822 3821->3822 3971 4028de 3972 4028e6 3971->3972 3973 4028ea FindNextFileW 3972->3973 3976 4028fc 3972->3976 3974 402943 3973->3974 3973->3976 3977 40653d lstrcpynW 3974->3977 3977->3976 3978 404ce0 3979 404cf0 3978->3979 3980 404d0c 3978->3980 3989 405b81 GetDlgItemTextW 3979->3989 3981 404d12 SHGetPathFromIDListW 3980->3981 3982 404d3f 3980->3982 3984 404d29 SendMessageW 3981->3984 3985 404d22 3981->3985 3984->3982 3987 40140b 2 API calls 3985->3987 3986 404cfd SendMessageW 3986->3980 3987->3984 3989->3986 3190 405b63 ShellExecuteExW 3990 401563 3991 402ba4 3990->3991 3994 406484 wsprintfW 3991->3994 3993 402ba9 3994->3993 3995 401968 3996 402d84 17 API calls 3995->3996 3997 40196f 3996->3997 3998 402d84 17 API calls 3997->3998 3999 40197c 3998->3999 4000 402da6 17 API calls 3999->4000 4001 401993 lstrlenW 4000->4001 4002 4019a4 4001->4002 4006 4019e5 4002->4006 4007 40653d lstrcpynW 4002->4007 4004 4019d5 4005 4019da lstrlenW 4004->4005 4004->4006 4005->4006 4007->4004 4008 40166a 4009 402da6 17 API calls 4008->4009 4010 401670 4009->4010 4011 406873 2 API calls 4010->4011 4012 401676 4011->4012 4013 402aeb 4014 402d84 17 API calls 4013->4014 4015 402af1 4014->4015 4016 40292e 4015->4016 4017 40657a 17 API calls 4015->4017 4017->4016 3286 4026ec 3287 402d84 17 API calls 3286->3287 3288 4026fb 3287->3288 3289 402745 ReadFile 3288->3289 3290 4060b0 ReadFile 3288->3290 3291 4027de 3288->3291 3293 402785 MultiByteToWideChar 3288->3293 3294 40283a 3288->3294 3296 4027ab SetFilePointer MultiByteToWideChar 3288->3296 3297 40284b 3288->3297 3299 402838 3288->3299 3289->3288 3289->3299 3290->3288 3291->3288 3291->3299 3300 40610e SetFilePointer 3291->3300 3293->3288 3309 406484 wsprintfW 3294->3309 3296->3288 3298 40286c SetFilePointer 3297->3298 3297->3299 3298->3299 3301 40612a 3300->3301 3304 406142 3300->3304 3302 4060b0 ReadFile 3301->3302 3303 406136 3302->3303 3303->3304 3305 406173 SetFilePointer 3303->3305 3306 40614b SetFilePointer 3303->3306 3304->3291 3305->3304 3306->3305 3307 406156 3306->3307 3308 4060df WriteFile 3307->3308 3308->3304 3309->3299 3556 40176f 3557 402da6 17 API calls 3556->3557 3558 401776 3557->3558 3559 401796 3558->3559 3560 40179e 3558->3560 3595 40653d lstrcpynW 3559->3595 3596 40653d lstrcpynW 3560->3596 3563 40179c 3567 4067c4 5 API calls 3563->3567 3564 4017a9 3565 405e0c 3 API calls 3564->3565 3566 4017af lstrcatW 3565->3566 3566->3563 3584 4017bb 3567->3584 3568 406873 2 API calls 3568->3584 3569 406008 2 API calls 3569->3584 3571 4017cd CompareFileTime 3571->3584 3572 40188d 3574 40559f 24 API calls 3572->3574 3573 401864 3575 40559f 24 API calls 3573->3575 3579 401879 3573->3579 3577 401897 3574->3577 3575->3579 3576 40653d lstrcpynW 3576->3584 3578 4032b4 31 API calls 3577->3578 3580 4018aa 3578->3580 3581 4018be SetFileTime 3580->3581 3582 4018d0 CloseHandle 3580->3582 3581->3582 3582->3579 3585 4018e1 3582->3585 3583 40657a 17 API calls 3583->3584 3584->3568 3584->3569 3584->3571 3584->3572 3584->3573 3584->3576 3584->3583 3590 405b9d MessageBoxIndirectW 3584->3590 3594 40602d GetFileAttributesW CreateFileW 3584->3594 3586 4018e6 3585->3586 3587 4018f9 3585->3587 3588 40657a 17 API calls 3586->3588 3589 40657a 17 API calls 3587->3589 3591 4018ee lstrcatW 3588->3591 3592 401901 3589->3592 3590->3584 3591->3592 3593 405b9d MessageBoxIndirectW 3592->3593 3593->3579 3594->3584 3595->3563 3596->3564 4018 401a72 4019 402d84 17 API calls 4018->4019 4020 401a7b 4019->4020 4021 402d84 17 API calls 4020->4021 4022 401a20 4021->4022 4023 401573 4024 401583 ShowWindow 4023->4024 4025 40158c 4023->4025 4024->4025 4026 402c2a 4025->4026 4027 40159a ShowWindow 4025->4027 4027->4026 4028 4023f4 4029 402da6 17 API calls 4028->4029 4030 402403 4029->4030 4031 402da6 17 API calls 4030->4031 4032 40240c 4031->4032 4033 402da6 17 API calls 4032->4033 4034 402416 GetPrivateProfileStringW 4033->4034 4035 4014f5 SetForegroundWindow 4036 402c2a 4035->4036 4037 401ff6 4038 402da6 17 API calls 4037->4038 4039 401ffd 4038->4039 4040 406873 2 API calls 4039->4040 4041 402003 4040->4041 4043 402014 4041->4043 4044 406484 wsprintfW 4041->4044 4044->4043 4045 401b77 4046 402da6 17 API calls 4045->4046 4047 401b7e 4046->4047 4048 402d84 17 API calls 4047->4048 4049 401b87 wsprintfW 4048->4049 4050 402c2a 4049->4050 4051 40167b 4052 402da6 17 API calls 4051->4052 4053 401682 4052->4053 4054 402da6 17 API calls 4053->4054 4055 40168b 4054->4055 4056 402da6 17 API calls 4055->4056 4057 401694 MoveFileW 4056->4057 4058 4016a7 4057->4058 4064 4016a0 4057->4064 4060 406873 2 API calls 4058->4060 4062 4022f6 4058->4062 4059 401423 24 API calls 4059->4062 4061 4016b6 4060->4061 4061->4062 4063 4062fd 36 API calls 4061->4063 4063->4064 4064->4059 4065 4019ff 4066 402da6 17 API calls 4065->4066 4067 401a06 4066->4067 4068 402da6 17 API calls 4067->4068 4069 401a0f 4068->4069 4070 401a16 lstrcmpiW 4069->4070 4071 401a28 lstrcmpW 4069->4071 4072 401a1c 4070->4072 4071->4072 4073 4022ff 4074 402da6 17 API calls 4073->4074 4075 402305 4074->4075 4076 402da6 17 API calls 4075->4076 4077 40230e 4076->4077 4078 402da6 17 API calls 4077->4078 4079 402317 4078->4079 4080 406873 2 API calls 4079->4080 4081 402320 4080->4081 4082 402331 lstrlenW lstrlenW 4081->4082 4083 402324 4081->4083 4085 40559f 24 API calls 4082->4085 4084 40559f 24 API calls 4083->4084 4087 40232c 4083->4087 4084->4087 4086 40236f SHFileOperationW 4085->4086 4086->4083 4086->4087 4088 401000 4089 401037 BeginPaint GetClientRect 4088->4089 4090 40100c DefWindowProcW 4088->4090 4092 4010f3 4089->4092 4095 401179 4090->4095 4093 401073 CreateBrushIndirect FillRect DeleteObject 4092->4093 4094 4010fc 4092->4094 4093->4092 4096 401102 CreateFontIndirectW 4094->4096 4097 401167 EndPaint 4094->4097 4096->4097 4098 401112 6 API calls 4096->4098 4097->4095 4098->4097 3154 401d81 3155 401d94 GetDlgItem 3154->3155 3156 401d87 3154->3156 3157 401d8e 3155->3157 3165 402d84 3156->3165 3159 401dd5 GetClientRect LoadImageW SendMessageW 3157->3159 3160 402da6 17 API calls 3157->3160 3162 401e33 3159->3162 3164 401e3f 3159->3164 3160->3159 3163 401e38 DeleteObject 3162->3163 3162->3164 3163->3164 3166 40657a 17 API calls 3165->3166 3167 402d99 3166->3167 3167->3157 4099 401503 4100 40150b 4099->4100 4102 40151e 4099->4102 4101 402d84 17 API calls 4100->4101 4101->4102 4103 402383 4104 40238a 4103->4104 4107 40239d 4103->4107 4105 40657a 17 API calls 4104->4105 4106 402397 4105->4106 4108 405b9d MessageBoxIndirectW 4106->4108 4108->4107 3217 402c05 SendMessageW 3218 402c2a 3217->3218 3219 402c1f InvalidateRect 3217->3219 3219->3218 4109 404f06 GetDlgItem GetDlgItem 4110 404f58 7 API calls 4109->4110 4116 40517d 4109->4116 4111 404ff2 SendMessageW 4110->4111 4112 404fff DeleteObject 4110->4112 4111->4112 4113 405008 4112->4113 4114 40503f 4113->4114 4117 40657a 17 API calls 4113->4117 4118 404499 18 API calls 4114->4118 4115 40525f 4119 40530b 4115->4119 4129 4052b8 SendMessageW 4115->4129 4149 405170 4115->4149 4116->4115 4120 4051ec 4116->4120 4163 404e54 SendMessageW 4116->4163 4123 405021 SendMessageW SendMessageW 4117->4123 4124 405053 4118->4124 4121 405315 SendMessageW 4119->4121 4122 40531d 4119->4122 4120->4115 4125 405251 SendMessageW 4120->4125 4121->4122 4131 405336 4122->4131 4132 40532f ImageList_Destroy 4122->4132 4147 405346 4122->4147 4123->4113 4128 404499 18 API calls 4124->4128 4125->4115 4126 404500 8 API calls 4130 40550c 4126->4130 4142 405064 4128->4142 4134 4052cd SendMessageW 4129->4134 4129->4149 4135 40533f GlobalFree 4131->4135 4131->4147 4132->4131 4133 4054c0 4138 4054d2 ShowWindow GetDlgItem ShowWindow 4133->4138 4133->4149 4137 4052e0 4134->4137 4135->4147 4136 40513f GetWindowLongW SetWindowLongW 4139 405158 4136->4139 4148 4052f1 SendMessageW 4137->4148 4138->4149 4140 405175 4139->4140 4141 40515d ShowWindow 4139->4141 4162 4044ce SendMessageW 4140->4162 4161 4044ce SendMessageW 4141->4161 4142->4136 4143 40513a 4142->4143 4146 4050b7 SendMessageW 4142->4146 4150 4050f5 SendMessageW 4142->4150 4151 405109 SendMessageW 4142->4151 4143->4136 4143->4139 4146->4142 4147->4133 4154 405381 4147->4154 4168 404ed4 4147->4168 4148->4119 4149->4126 4150->4142 4151->4142 4153 40548b 4155 405496 InvalidateRect 4153->4155 4158 4054a2 4153->4158 4156 4053af SendMessageW 4154->4156 4157 4053c5 4154->4157 4155->4158 4156->4157 4157->4153 4159 405439 SendMessageW SendMessageW 4157->4159 4158->4133 4177 404e0f 4158->4177 4159->4157 4161->4149 4162->4116 4164 404eb3 SendMessageW 4163->4164 4165 404e77 GetMessagePos ScreenToClient SendMessageW 4163->4165 4167 404eab 4164->4167 4166 404eb0 4165->4166 4165->4167 4166->4164 4167->4120 4180 40653d lstrcpynW 4168->4180 4170 404ee7 4181 406484 wsprintfW 4170->4181 4172 404ef1 4173 40140b 2 API calls 4172->4173 4174 404efa 4173->4174 4182 40653d lstrcpynW 4174->4182 4176 404f01 4176->4154 4183 404d46 4177->4183 4179 404e24 4179->4133 4180->4170 4181->4172 4182->4176 4184 404d5f 4183->4184 4185 40657a 17 API calls 4184->4185 4186 404dc3 4185->4186 4187 40657a 17 API calls 4186->4187 4188 404dce 4187->4188 4189 40657a 17 API calls 4188->4189 4190 404de4 lstrlenW wsprintfW SetDlgItemTextW 4189->4190 4190->4179 4191 404609 lstrlenW 4192 404628 4191->4192 4193 40462a WideCharToMultiByte 4191->4193 4192->4193 3220 40248a 3221 402da6 17 API calls 3220->3221 3222 40249c 3221->3222 3223 402da6 17 API calls 3222->3223 3224 4024a6 3223->3224 3237 402e36 3224->3237 3227 40292e 3228 4024de 3230 4024ea 3228->3230 3232 402d84 17 API calls 3228->3232 3229 402da6 17 API calls 3231 4024d4 lstrlenW 3229->3231 3233 402509 RegSetValueExW 3230->3233 3241 4032b4 3230->3241 3231->3228 3232->3230 3235 40251f RegCloseKey 3233->3235 3235->3227 3238 402e51 3237->3238 3261 4063d8 3238->3261 3242 4032cd 3241->3242 3243 4032fb 3242->3243 3268 4034e5 SetFilePointer 3242->3268 3265 4034cf 3243->3265 3247 403468 3249 4034aa 3247->3249 3252 40346c 3247->3252 3248 403318 GetTickCount 3253 403452 3248->3253 3257 403367 3248->3257 3250 4034cf ReadFile 3249->3250 3250->3253 3251 4034cf ReadFile 3251->3257 3252->3253 3254 4034cf ReadFile 3252->3254 3255 4060df WriteFile 3252->3255 3253->3233 3254->3252 3255->3252 3256 4033bd GetTickCount 3256->3257 3257->3251 3257->3253 3257->3256 3258 4033e2 MulDiv wsprintfW 3257->3258 3260 4060df WriteFile 3257->3260 3259 40559f 24 API calls 3258->3259 3259->3257 3260->3257 3262 4063e7 3261->3262 3263 4063f2 RegCreateKeyExW 3262->3263 3264 4024b6 3262->3264 3263->3264 3264->3227 3264->3228 3264->3229 3266 4060b0 ReadFile 3265->3266 3267 403306 3266->3267 3267->3247 3267->3248 3267->3253 3268->3243 4194 40498a 4195 4049b6 4194->4195 4196 4049c7 4194->4196 4255 405b81 GetDlgItemTextW 4195->4255 4197 4049d3 GetDlgItem 4196->4197 4204 404a32 4196->4204 4200 4049e7 4197->4200 4199 4049c1 4202 4067c4 5 API calls 4199->4202 4203 4049fb SetWindowTextW 4200->4203 4207 405eb7 4 API calls 4200->4207 4201 404b16 4253 404cc5 4201->4253 4257 405b81 GetDlgItemTextW 4201->4257 4202->4196 4208 404499 18 API calls 4203->4208 4204->4201 4209 40657a 17 API calls 4204->4209 4204->4253 4206 404500 8 API calls 4211 404cd9 4206->4211 4212 4049f1 4207->4212 4213 404a17 4208->4213 4214 404aa6 SHBrowseForFolderW 4209->4214 4210 404b46 4215 405f14 18 API calls 4210->4215 4212->4203 4219 405e0c 3 API calls 4212->4219 4216 404499 18 API calls 4213->4216 4214->4201 4217 404abe CoTaskMemFree 4214->4217 4218 404b4c 4215->4218 4220 404a25 4216->4220 4221 405e0c 3 API calls 4217->4221 4258 40653d lstrcpynW 4218->4258 4219->4203 4256 4044ce SendMessageW 4220->4256 4223 404acb 4221->4223 4226 404b02 SetDlgItemTextW 4223->4226 4230 40657a 17 API calls 4223->4230 4225 404a2b 4228 40690a 5 API calls 4225->4228 4226->4201 4227 404b63 4229 40690a 5 API calls 4227->4229 4228->4204 4241 404b6a 4229->4241 4231 404aea lstrcmpiW 4230->4231 4231->4226 4233 404afb lstrcatW 4231->4233 4232 404bab 4259 40653d lstrcpynW 4232->4259 4233->4226 4235 404bb2 4236 405eb7 4 API calls 4235->4236 4237 404bb8 GetDiskFreeSpaceW 4236->4237 4239 404bdc MulDiv 4237->4239 4243 404c03 4237->4243 4239->4243 4240 405e58 2 API calls 4240->4241 4241->4232 4241->4240 4241->4243 4242 404c74 4245 404c97 4242->4245 4247 40140b 2 API calls 4242->4247 4243->4242 4244 404e0f 20 API calls 4243->4244 4246 404c61 4244->4246 4260 4044bb KiUserCallbackDispatcher 4245->4260 4248 404c76 SetDlgItemTextW 4246->4248 4249 404c66 4246->4249 4247->4245 4248->4242 4251 404d46 20 API calls 4249->4251 4251->4242 4252 404cb3 4252->4253 4254 4048e3 SendMessageW 4252->4254 4253->4206 4254->4253 4255->4199 4256->4225 4257->4210 4258->4227 4259->4235 4260->4252 4261 40290b 4262 402da6 17 API calls 4261->4262 4263 402912 FindFirstFileW 4262->4263 4264 40293a 4263->4264 4267 402925 4263->4267 4269 406484 wsprintfW 4264->4269 4266 402943 4270 40653d lstrcpynW 4266->4270 4269->4266 4270->4267 4271 40190c 4272 401943 4271->4272 4273 402da6 17 API calls 4272->4273 4274 401948 4273->4274 4275 405c49 67 API calls 4274->4275 4276 401951 4275->4276 4277 40190f 4278 402da6 17 API calls 4277->4278 4279 401916 4278->4279 4280 405b9d MessageBoxIndirectW 4279->4280 4281 40191f 4280->4281 3597 402891 3598 402898 3597->3598 3599 402ba9 3597->3599 3600 402d84 17 API calls 3598->3600 3601 40289f 3600->3601 3602 4028ae SetFilePointer 3601->3602 3602->3599 3603 4028be 3602->3603 3605 406484 wsprintfW 3603->3605 3605->3599 4282 401491 4283 40559f 24 API calls 4282->4283 4284 401498 4283->4284 3606 403b12 3607 403b2a 3606->3607 3608 403b1c CloseHandle 3606->3608 3613 403b57 3607->3613 3608->3607 3611 405c49 67 API calls 3612 403b3b 3611->3612 3615 403b65 3613->3615 3614 403b2f 3614->3611 3615->3614 3616 403b6a FreeLibrary GlobalFree 3615->3616 3616->3614 3616->3616 4285 401f12 4286 402da6 17 API calls 4285->4286 4287 401f18 4286->4287 4288 402da6 17 API calls 4287->4288 4289 401f21 4288->4289 4290 402da6 17 API calls 4289->4290 4291 401f2a 4290->4291 4292 402da6 17 API calls 4291->4292 4293 401f33 4292->4293 4294 401423 24 API calls 4293->4294 4295 401f3a 4294->4295 4302 405b63 ShellExecuteExW 4295->4302 4297 401f82 4298 40292e 4297->4298 4299 4069b5 5 API calls 4297->4299 4300 401f9f CloseHandle 4299->4300 4300->4298 4302->4297 4303 405513 4304 405523 4303->4304 4305 405537 4303->4305 4306 405580 4304->4306 4307 405529 4304->4307 4308 40553f IsWindowVisible 4305->4308 4314 405556 4305->4314 4309 405585 CallWindowProcW 4306->4309 4310 4044e5 SendMessageW 4307->4310 4308->4306 4311 40554c 4308->4311 4312 405533 4309->4312 4310->4312 4313 404e54 5 API calls 4311->4313 4313->4314 4314->4309 4315 404ed4 4 API calls 4314->4315 4315->4306 4316 402f93 4317 402fa5 SetTimer 4316->4317 4318 402fbe 4316->4318 4317->4318 4319 403013 4318->4319 4320 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4318->4320 4320->4319 4321 401d17 4322 402d84 17 API calls 4321->4322 4323 401d1d IsWindow 4322->4323 4324 401a20 4323->4324 3643 403f9a 3644 403fb2 3643->3644 3645 404113 3643->3645 3644->3645 3646 403fbe 3644->3646 3647 404164 3645->3647 3648 404124 GetDlgItem GetDlgItem 3645->3648 3650 403fc9 SetWindowPos 3646->3650 3651 403fdc 3646->3651 3649 4041be 3647->3649 3660 401389 2 API calls 3647->3660 3652 404499 18 API calls 3648->3652 3653 4044e5 SendMessageW 3649->3653 3661 40410e 3649->3661 3650->3651 3654 403fe5 ShowWindow 3651->3654 3655 404027 3651->3655 3656 40414e SetClassLongW 3652->3656 3682 4041d0 3653->3682 3662 4040d1 3654->3662 3663 404005 GetWindowLongW 3654->3663 3657 404046 3655->3657 3658 40402f DestroyWindow 3655->3658 3659 40140b 2 API calls 3656->3659 3665 40404b SetWindowLongW 3657->3665 3666 40405c 3657->3666 3664 404422 3658->3664 3659->3647 3667 404196 3660->3667 3723 404500 3662->3723 3663->3662 3669 40401e ShowWindow 3663->3669 3664->3661 3676 404453 ShowWindow 3664->3676 3665->3661 3666->3662 3670 404068 GetDlgItem 3666->3670 3667->3649 3671 40419a SendMessageW 3667->3671 3669->3655 3674 404096 3670->3674 3675 404079 SendMessageW IsWindowEnabled 3670->3675 3671->3661 3672 40140b 2 API calls 3672->3682 3673 404424 DestroyWindow KiUserCallbackDispatcher 3673->3664 3678 4040a3 3674->3678 3680 4040ea SendMessageW 3674->3680 3681 4040b6 3674->3681 3688 40409b 3674->3688 3675->3661 3675->3674 3676->3661 3677 40657a 17 API calls 3677->3682 3678->3680 3678->3688 3680->3662 3683 4040d3 3681->3683 3684 4040be 3681->3684 3682->3661 3682->3672 3682->3673 3682->3677 3685 404499 18 API calls 3682->3685 3705 404364 DestroyWindow 3682->3705 3714 404499 3682->3714 3686 40140b 2 API calls 3683->3686 3687 40140b 2 API calls 3684->3687 3685->3682 3686->3688 3687->3688 3688->3662 3720 404472 3688->3720 3690 40424b GetDlgItem 3691 404260 3690->3691 3692 404268 ShowWindow KiUserCallbackDispatcher 3690->3692 3691->3692 3717 4044bb KiUserCallbackDispatcher 3692->3717 3694 404292 KiUserCallbackDispatcher 3699 4042a6 3694->3699 3695 4042ab GetSystemMenu EnableMenuItem SendMessageW 3696 4042db SendMessageW 3695->3696 3695->3699 3696->3699 3698 403f7b 18 API calls 3698->3699 3699->3695 3699->3698 3718 4044ce SendMessageW 3699->3718 3719 40653d lstrcpynW 3699->3719 3701 40430a lstrlenW 3702 40657a 17 API calls 3701->3702 3703 404320 SetWindowTextW 3702->3703 3704 401389 2 API calls 3703->3704 3704->3682 3705->3664 3706 40437e CreateDialogParamW 3705->3706 3706->3664 3707 4043b1 3706->3707 3708 404499 18 API calls 3707->3708 3709 4043bc GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3708->3709 3710 401389 2 API calls 3709->3710 3711 404402 3710->3711 3711->3661 3712 40440a ShowWindow 3711->3712 3713 4044e5 SendMessageW 3712->3713 3713->3664 3715 40657a 17 API calls 3714->3715 3716 4044a4 SetDlgItemTextW 3715->3716 3716->3690 3717->3694 3718->3699 3719->3701 3721 404479 3720->3721 3722 40447f SendMessageW 3720->3722 3721->3722 3722->3662 3724 4045c3 3723->3724 3725 404518 GetWindowLongW 3723->3725 3724->3661 3725->3724 3726 40452d 3725->3726 3726->3724 3727 40455a GetSysColor 3726->3727 3728 40455d 3726->3728 3727->3728 3729 404563 SetTextColor 3728->3729 3730 40456d SetBkMode 3728->3730 3729->3730 3731 404585 GetSysColor 3730->3731 3732 40458b 3730->3732 3731->3732 3733 404592 SetBkColor 3732->3733 3734 40459c 3732->3734 3733->3734 3734->3724 3735 4045b6 CreateBrushIndirect 3734->3735 3736 4045af DeleteObject 3734->3736 3735->3724 3736->3735 3737 401b9b 3738 401ba8 3737->3738 3739 401bec 3737->3739 3744 401c31 3738->3744 3745 401bbf 3738->3745 3740 401bf1 3739->3740 3741 401c16 GlobalAlloc 3739->3741 3746 40239d 3740->3746 3756 40653d lstrcpynW 3740->3756 3742 40657a 17 API calls 3741->3742 3742->3744 3743 40657a 17 API calls 3747 402397 3743->3747 3744->3743 3744->3746 3757 40653d lstrcpynW 3745->3757 3752 405b9d MessageBoxIndirectW 3747->3752 3750 401c03 GlobalFree 3750->3746 3751 401bce 3758 40653d lstrcpynW 3751->3758 3752->3746 3754 401bdd 3759 40653d lstrcpynW 3754->3759 3756->3750 3757->3751 3758->3754 3759->3746 4325 40261c 4326 402da6 17 API calls 4325->4326 4327 402623 4326->4327 4330 40602d GetFileAttributesW CreateFileW 4327->4330 4329 40262f 4330->4329 3823 40259e 3824 402de6 17 API calls 3823->3824 3825 4025a8 3824->3825 3826 402d84 17 API calls 3825->3826 3827 4025b1 3826->3827 3828 4025d9 RegEnumValueW 3827->3828 3829 4025cd RegEnumKeyW 3827->3829 3830 40292e 3827->3830 3831 4025f5 RegCloseKey 3828->3831 3832 4025ee 3828->3832 3829->3831 3831->3830 3832->3831 4331 40149e 4332 4014ac PostQuitMessage 4331->4332 4333 40239d 4331->4333 4332->4333 4334 4015a3 4335 402da6 17 API calls 4334->4335 4336 4015aa SetFileAttributesW 4335->4336 4337 4015bc 4336->4337 3191 401fa4 3192 402da6 17 API calls 3191->3192 3193 401faa 3192->3193 3194 40559f 24 API calls 3193->3194 3195 401fb4 3194->3195 3204 405b20 CreateProcessW 3195->3204 3198 40292e 3201 401fcf 3202 401fdd CloseHandle 3201->3202 3212 406484 wsprintfW 3201->3212 3202->3198 3205 405b53 CloseHandle 3204->3205 3206 401fba 3204->3206 3205->3206 3206->3198 3206->3202 3207 4069b5 WaitForSingleObject 3206->3207 3208 4069cf 3207->3208 3209 4069e1 GetExitCodeProcess 3208->3209 3213 406946 3208->3213 3209->3201 3212->3202 3214 406963 PeekMessageW 3213->3214 3215 406973 WaitForSingleObject 3214->3215 3216 406959 DispatchMessageW 3214->3216 3215->3208 3216->3214 3269 40252a 3280 402de6 3269->3280 3272 402da6 17 API calls 3273 40253d 3272->3273 3274 402548 RegQueryValueExW 3273->3274 3279 40292e 3273->3279 3275 40256e RegCloseKey 3274->3275 3276 402568 3274->3276 3275->3279 3276->3275 3285 406484 wsprintfW 3276->3285 3281 402da6 17 API calls 3280->3281 3282 402dfd 3281->3282 3283 4063aa RegOpenKeyExW 3282->3283 3284 402534 3283->3284 3284->3272 3285->3275 4338 40202a 4339 402da6 17 API calls 4338->4339 4340 402031 4339->4340 4341 40690a 5 API calls 4340->4341 4342 402040 4341->4342 4343 40205c GlobalAlloc 4342->4343 4346 4020cc 4342->4346 4344 402070 4343->4344 4343->4346 4345 40690a 5 API calls 4344->4345 4347 402077 4345->4347 4348 40690a 5 API calls 4347->4348 4349 402081 4348->4349 4349->4346 4353 406484 wsprintfW 4349->4353 4351 4020ba 4354 406484 wsprintfW 4351->4354 4353->4351 4354->4346 4355 4021aa 4356 402da6 17 API calls 4355->4356 4357 4021b1 4356->4357 4358 402da6 17 API calls 4357->4358 4359 4021bb 4358->4359 4360 402da6 17 API calls 4359->4360 4361 4021c5 4360->4361 4362 402da6 17 API calls 4361->4362 4363 4021cf 4362->4363 4364 402da6 17 API calls 4363->4364 4365 4021d9 4364->4365 4366 402218 CoCreateInstance 4365->4366 4367 402da6 17 API calls 4365->4367 4370 402237 4366->4370 4367->4366 4368 401423 24 API calls 4369 4022f6 4368->4369 4370->4368 4370->4369 4371 403baa 4372 403bb5 4371->4372 4373 403bb9 4372->4373 4374 403bbc GlobalAlloc 4372->4374 4374->4373 3310 40352d SetErrorMode GetVersionExW 3311 4035b7 3310->3311 3312 40357f GetVersionExW 3310->3312 3313 403610 3311->3313 3314 40690a 5 API calls 3311->3314 3312->3311 3315 40689a 3 API calls 3313->3315 3314->3313 3316 403626 lstrlenA 3315->3316 3316->3313 3317 403636 3316->3317 3318 40690a 5 API calls 3317->3318 3319 40363d 3318->3319 3320 40690a 5 API calls 3319->3320 3321 403644 3320->3321 3322 40690a 5 API calls 3321->3322 3326 403650 #17 OleInitialize SHGetFileInfoW 3322->3326 3325 40369d GetCommandLineW 3401 40653d lstrcpynW 3325->3401 3400 40653d lstrcpynW 3326->3400 3328 4036af 3329 405e39 CharNextW 3328->3329 3330 4036d5 CharNextW 3329->3330 3342 4036e6 3330->3342 3331 4037e4 3332 4037f8 GetTempPathW 3331->3332 3402 4034fc 3332->3402 3334 403810 3336 403814 GetWindowsDirectoryW lstrcatW 3334->3336 3337 40386a DeleteFileW 3334->3337 3335 405e39 CharNextW 3335->3342 3338 4034fc 12 API calls 3336->3338 3412 40307d GetTickCount GetModuleFileNameW 3337->3412 3340 403830 3338->3340 3340->3337 3343 403834 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3340->3343 3341 40387d 3345 403a59 ExitProcess CoUninitialize 3341->3345 3347 403932 3341->3347 3355 405e39 CharNextW 3341->3355 3342->3331 3342->3335 3344 4037e6 3342->3344 3346 4034fc 12 API calls 3343->3346 3496 40653d lstrcpynW 3344->3496 3349 403a69 3345->3349 3350 403a7e 3345->3350 3354 403862 3346->3354 3440 403bec 3347->3440 3501 405b9d 3349->3501 3352 403a86 GetCurrentProcess OpenProcessToken 3350->3352 3353 403afc ExitProcess 3350->3353 3358 403acc 3352->3358 3359 403a9d LookupPrivilegeValueW AdjustTokenPrivileges 3352->3359 3354->3337 3354->3345 3369 40389f 3355->3369 3362 40690a 5 API calls 3358->3362 3359->3358 3360 403941 3360->3345 3365 403ad3 3362->3365 3363 403908 3366 405f14 18 API calls 3363->3366 3364 403949 3368 405b08 5 API calls 3364->3368 3367 403ae8 ExitWindowsEx 3365->3367 3371 403af5 3365->3371 3370 403914 3366->3370 3367->3353 3367->3371 3372 40394e lstrcatW 3368->3372 3369->3363 3369->3364 3370->3345 3497 40653d lstrcpynW 3370->3497 3505 40140b 3371->3505 3373 40396a lstrcatW lstrcmpiW 3372->3373 3374 40395f lstrcatW 3372->3374 3373->3360 3376 40398a 3373->3376 3374->3373 3378 403996 3376->3378 3379 40398f 3376->3379 3382 405aeb 2 API calls 3378->3382 3381 405a6e 4 API calls 3379->3381 3380 403927 3498 40653d lstrcpynW 3380->3498 3384 403994 3381->3384 3385 40399b SetCurrentDirectoryW 3382->3385 3384->3385 3386 4039b8 3385->3386 3387 4039ad 3385->3387 3500 40653d lstrcpynW 3386->3500 3499 40653d lstrcpynW 3387->3499 3390 40657a 17 API calls 3391 4039fa DeleteFileW 3390->3391 3392 403a06 CopyFileW 3391->3392 3397 4039c5 3391->3397 3392->3397 3393 403a50 3395 4062fd 36 API calls 3393->3395 3394 4062fd 36 API calls 3394->3397 3395->3360 3396 40657a 17 API calls 3396->3397 3397->3390 3397->3393 3397->3394 3397->3396 3398 405b20 2 API calls 3397->3398 3399 403a3a CloseHandle 3397->3399 3398->3397 3399->3397 3400->3325 3401->3328 3403 4067c4 5 API calls 3402->3403 3405 403508 3403->3405 3404 403512 3404->3334 3405->3404 3406 405e0c 3 API calls 3405->3406 3407 40351a 3406->3407 3408 405aeb 2 API calls 3407->3408 3409 403520 3408->3409 3508 40605c 3409->3508 3512 40602d GetFileAttributesW CreateFileW 3412->3512 3414 4030bd 3432 4030cd 3414->3432 3513 40653d lstrcpynW 3414->3513 3416 4030e3 3417 405e58 2 API calls 3416->3417 3418 4030e9 3417->3418 3514 40653d lstrcpynW 3418->3514 3420 4030f4 GetFileSize 3421 4031ee 3420->3421 3439 40310b 3420->3439 3515 403019 3421->3515 3423 4031f7 3425 403227 GlobalAlloc 3423->3425 3423->3432 3527 4034e5 SetFilePointer 3423->3527 3424 4034cf ReadFile 3424->3439 3526 4034e5 SetFilePointer 3425->3526 3427 40325a 3429 403019 6 API calls 3427->3429 3429->3432 3430 403210 3433 4034cf ReadFile 3430->3433 3431 403242 3434 4032b4 31 API calls 3431->3434 3432->3341 3435 40321b 3433->3435 3437 40324e 3434->3437 3435->3425 3435->3432 3436 403019 6 API calls 3436->3439 3437->3432 3437->3437 3438 40328b SetFilePointer 3437->3438 3438->3432 3439->3421 3439->3424 3439->3427 3439->3432 3439->3436 3441 40690a 5 API calls 3440->3441 3442 403c00 3441->3442 3443 403c06 3442->3443 3444 403c18 3442->3444 3543 406484 wsprintfW 3443->3543 3445 40640b 3 API calls 3444->3445 3446 403c48 3445->3446 3448 403c67 lstrcatW 3446->3448 3450 40640b 3 API calls 3446->3450 3449 403c16 3448->3449 3528 403ec2 3449->3528 3450->3448 3453 405f14 18 API calls 3454 403c99 3453->3454 3455 403d2d 3454->3455 3457 40640b 3 API calls 3454->3457 3456 405f14 18 API calls 3455->3456 3458 403d33 3456->3458 3459 403ccb 3457->3459 3460 403d43 LoadImageW 3458->3460 3461 40657a 17 API calls 3458->3461 3459->3455 3464 403cec lstrlenW 3459->3464 3467 405e39 CharNextW 3459->3467 3462 403de9 3460->3462 3463 403d6a RegisterClassW 3460->3463 3461->3460 3466 40140b 2 API calls 3462->3466 3465 403da0 SystemParametersInfoW CreateWindowExW 3463->3465 3495 403df3 3463->3495 3468 403d20 3464->3468 3469 403cfa lstrcmpiW 3464->3469 3465->3462 3473 403def 3466->3473 3471 403ce9 3467->3471 3470 405e0c 3 API calls 3468->3470 3469->3468 3472 403d0a GetFileAttributesW 3469->3472 3475 403d26 3470->3475 3471->3464 3476 403d16 3472->3476 3474 403ec2 18 API calls 3473->3474 3473->3495 3477 403e00 3474->3477 3544 40653d lstrcpynW 3475->3544 3476->3468 3479 405e58 2 API calls 3476->3479 3480 403e0c ShowWindow 3477->3480 3481 403e8f 3477->3481 3479->3468 3483 40689a 3 API calls 3480->3483 3536 405672 OleInitialize 3481->3536 3485 403e24 3483->3485 3484 403e95 3486 403eb1 3484->3486 3487 403e99 3484->3487 3488 403e32 GetClassInfoW 3485->3488 3490 40689a 3 API calls 3485->3490 3489 40140b 2 API calls 3486->3489 3493 40140b 2 API calls 3487->3493 3487->3495 3491 403e46 GetClassInfoW RegisterClassW 3488->3491 3492 403e5c DialogBoxParamW 3488->3492 3489->3495 3490->3488 3491->3492 3494 40140b 2 API calls 3492->3494 3493->3495 3494->3495 3495->3360 3496->3332 3497->3380 3498->3347 3499->3386 3500->3397 3502 405bb2 3501->3502 3503 403a76 ExitProcess 3502->3503 3504 405bc6 MessageBoxIndirectW 3502->3504 3504->3503 3506 401389 2 API calls 3505->3506 3507 401420 3506->3507 3507->3353 3509 406069 GetTickCount GetTempFileNameW 3508->3509 3510 40352b 3509->3510 3511 40609f 3509->3511 3510->3334 3511->3509 3511->3510 3512->3414 3513->3416 3514->3420 3516 403022 3515->3516 3517 40303a 3515->3517 3518 403032 3516->3518 3519 40302b DestroyWindow 3516->3519 3520 403042 3517->3520 3521 40304a GetTickCount 3517->3521 3518->3423 3519->3518 3522 406946 2 API calls 3520->3522 3523 403058 CreateDialogParamW ShowWindow 3521->3523 3524 40307b 3521->3524 3525 403048 3522->3525 3523->3524 3524->3423 3525->3423 3526->3431 3527->3430 3529 403ed6 3528->3529 3545 406484 wsprintfW 3529->3545 3531 403f47 3546 403f7b 3531->3546 3533 403c77 3533->3453 3534 403f4c 3534->3533 3535 40657a 17 API calls 3534->3535 3535->3534 3549 4044e5 3536->3549 3538 405695 3542 4056bc 3538->3542 3552 401389 3538->3552 3539 4044e5 SendMessageW 3540 4056ce OleUninitialize 3539->3540 3540->3484 3542->3539 3543->3449 3544->3455 3545->3531 3547 40657a 17 API calls 3546->3547 3548 403f89 SetWindowTextW 3547->3548 3548->3534 3550 4044fd 3549->3550 3551 4044ee SendMessageW 3549->3551 3550->3538 3551->3550 3554 401390 3552->3554 3553 4013fe 3553->3538 3554->3553 3555 4013cb MulDiv SendMessageW 3554->3555 3555->3554 4375 401a30 4376 402da6 17 API calls 4375->4376 4377 401a39 ExpandEnvironmentStringsW 4376->4377 4378 401a4d 4377->4378 4380 401a60 4377->4380 4379 401a52 lstrcmpW 4378->4379 4378->4380 4379->4380 4386 4023b2 4387 4023c0 4386->4387 4388 4023ba 4386->4388 4390 4023ce 4387->4390 4391 402da6 17 API calls 4387->4391 4389 402da6 17 API calls 4388->4389 4389->4387 4392 402da6 17 API calls 4390->4392 4394 4023dc 4390->4394 4391->4390 4392->4394 4393 402da6 17 API calls 4395 4023e5 WritePrivateProfileStringW 4393->4395 4394->4393 4396 402434 4397 402467 4396->4397 4398 40243c 4396->4398 4399 402da6 17 API calls 4397->4399 4400 402de6 17 API calls 4398->4400 4401 40246e 4399->4401 4402 402443 4400->4402 4407 402e64 4401->4407 4404 402da6 17 API calls 4402->4404 4405 40247b 4402->4405 4406 402454 RegDeleteValueW RegCloseKey 4404->4406 4406->4405 4408 402e71 4407->4408 4409 402e78 4407->4409 4408->4405 4409->4408 4411 402ea9 4409->4411 4412 4063aa RegOpenKeyExW 4411->4412 4413 402ed7 4412->4413 4414 402ee7 RegEnumValueW 4413->4414 4415 402f0a 4413->4415 4422 402f81 4413->4422 4414->4415 4416 402f71 RegCloseKey 4414->4416 4415->4416 4417 402f46 RegEnumKeyW 4415->4417 4418 402f4f RegCloseKey 4415->4418 4421 402ea9 6 API calls 4415->4421 4416->4422 4417->4415 4417->4418 4419 40690a 5 API calls 4418->4419 4420 402f5f 4419->4420 4420->4422 4423 402f63 RegDeleteKeyW 4420->4423 4421->4415 4422->4408 4423->4422 4424 401735 4425 402da6 17 API calls 4424->4425 4426 40173c SearchPathW 4425->4426 4427 401757 4426->4427 4428 401d38 4429 402d84 17 API calls 4428->4429 4430 401d3f 4429->4430 4431 402d84 17 API calls 4430->4431 4432 401d4b GetDlgItem 4431->4432 4433 402638 4432->4433 4434 4014b8 4435 4014be 4434->4435 4436 401389 2 API calls 4435->4436 4437 4014c6 4436->4437 4438 40263e 4439 402652 4438->4439 4440 40266d 4438->4440 4441 402d84 17 API calls 4439->4441 4442 402672 4440->4442 4443 40269d 4440->4443 4450 402659 4441->4450 4444 402da6 17 API calls 4442->4444 4445 402da6 17 API calls 4443->4445 4447 402679 4444->4447 4446 4026a4 lstrlenW 4445->4446 4446->4450 4455 40655f WideCharToMultiByte 4447->4455 4449 40268d lstrlenA 4449->4450 4451 4026d1 4450->4451 4452 4026e7 4450->4452 4454 40610e 5 API calls 4450->4454 4451->4452 4453 4060df WriteFile 4451->4453 4453->4452 4454->4451 4455->4449

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 0 40352d-40357d SetErrorMode GetVersionExW 1 4035b7-4035be 0->1 2 40357f-4035b3 GetVersionExW 0->2 3 4035c0 1->3 4 4035c8-403608 1->4 2->1 3->4 5 40360a-403612 call 40690a 4->5 6 40361b 4->6 5->6 11 403614 5->11 8 403620-403634 call 40689a lstrlenA 6->8 13 403636-403652 call 40690a * 3 8->13 11->6 20 403663-4036c5 #17 OleInitialize SHGetFileInfoW call 40653d GetCommandLineW call 40653d 13->20 21 403654-40365a 13->21 28 4036c7-4036c9 20->28 29 4036ce-4036e1 call 405e39 CharNextW 20->29 21->20 25 40365c 21->25 25->20 28->29 32 4037d8-4037de 29->32 33 4037e4 32->33 34 4036e6-4036ec 32->34 37 4037f8-403812 GetTempPathW call 4034fc 33->37 35 4036f5-4036fb 34->35 36 4036ee-4036f3 34->36 38 403702-403706 35->38 39 4036fd-403701 35->39 36->35 36->36 47 403814-403832 GetWindowsDirectoryW lstrcatW call 4034fc 37->47 48 40386a-403882 DeleteFileW call 40307d 37->48 41 4037c6-4037d4 call 405e39 38->41 42 40370c-403712 38->42 39->38 41->32 59 4037d6-4037d7 41->59 45 403714-40371b 42->45 46 40372c-403765 42->46 52 403722 45->52 53 40371d-403720 45->53 54 403781-4037bb 46->54 55 403767-40376c 46->55 47->48 62 403834-403864 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fc 47->62 64 403888-40388e 48->64 65 403a59-403a67 ExitProcess CoUninitialize 48->65 52->46 53->46 53->52 57 4037c3-4037c5 54->57 58 4037bd-4037c1 54->58 55->54 61 40376e-403776 55->61 57->41 58->57 63 4037e6-4037f3 call 40653d 58->63 59->32 66 403778-40377b 61->66 67 40377d 61->67 62->48 62->65 63->37 69 403894-4038a7 call 405e39 64->69 70 403935-40393c call 403bec 64->70 72 403a69-403a78 call 405b9d ExitProcess 65->72 73 403a7e-403a84 65->73 66->54 66->67 67->54 88 4038f9-403906 69->88 89 4038a9-4038de 69->89 84 403941-403944 70->84 75 403a86-403a9b GetCurrentProcess OpenProcessToken 73->75 76 403afc-403b04 73->76 81 403acc-403ada call 40690a 75->81 82 403a9d-403ac6 LookupPrivilegeValueW AdjustTokenPrivileges 75->82 85 403b06 76->85 86 403b09-403b0c ExitProcess 76->86 95 403ae8-403af3 ExitWindowsEx 81->95 96 403adc-403ae6 81->96 82->81 84->65 85->86 90 403908-403916 call 405f14 88->90 91 403949-40395d call 405b08 lstrcatW 88->91 93 4038e0-4038e4 89->93 90->65 106 40391c-403932 call 40653d * 2 90->106 104 40396a-403984 lstrcatW lstrcmpiW 91->104 105 40395f-403965 lstrcatW 91->105 98 4038e6-4038eb 93->98 99 4038ed-4038f5 93->99 95->76 102 403af5-403af7 call 40140b 95->102 96->95 96->102 98->99 100 4038f7 98->100 99->93 99->100 100->88 102->76 109 403a57 104->109 110 40398a-40398d 104->110 105->104 106->70 109->65 112 403996 call 405aeb 110->112 113 40398f-403994 call 405a6e 110->113 119 40399b-4039ab SetCurrentDirectoryW 112->119 113->119 121 4039b8-4039e4 call 40653d 119->121 122 4039ad-4039b3 call 40653d 119->122 126 4039e9-403a04 call 40657a DeleteFileW 121->126 122->121 129 403a44-403a4e 126->129 130 403a06-403a16 CopyFileW 126->130 129->126 132 403a50-403a52 call 4062fd 129->132 130->129 131 403a18-403a38 call 4062fd call 40657a call 405b20 130->131 131->129 140 403a3a-403a41 CloseHandle 131->140 132->109 140->129
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00008001), ref: 00403550
                                                                                                                                                                                                                                                      • GetVersionExW.KERNEL32(?), ref: 00403579
                                                                                                                                                                                                                                                      • GetVersionExW.KERNEL32(0000011C), ref: 00403590
                                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403627
                                                                                                                                                                                                                                                      • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403663
                                                                                                                                                                                                                                                      • OleInitialize.OLE32(00000000), ref: 0040366A
                                                                                                                                                                                                                                                      • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 00403688
                                                                                                                                                                                                                                                      • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 0040369D
                                                                                                                                                                                                                                                      • CharNextW.USER32(00000000,00440000,00000020,00440000,00000000), ref: 004036D6
                                                                                                                                                                                                                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 00403809
                                                                                                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040381A
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403826
                                                                                                                                                                                                                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040383A
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403842
                                                                                                                                                                                                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403853
                                                                                                                                                                                                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040385B
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(1033), ref: 0040386F
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 00403956
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 00403965
                                                                                                                                                                                                                                                        • Part of subcall function 00405AEB: CreateDirectoryW.KERNEL32(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 00403970
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00441800,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 0040397C
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040399C
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,?), ref: 004039FB
                                                                                                                                                                                                                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\Setup.exe,0042AA28,00000001), ref: 00403A0E
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403A3B
                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32(?), ref: 00403A59
                                                                                                                                                                                                                                                      • CoUninitialize.COMBASE(?), ref: 00403A5E
                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00403A78
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A8C
                                                                                                                                                                                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403A93
                                                                                                                                                                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA7
                                                                                                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AC6
                                                                                                                                                                                                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AEB
                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00403B0C
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                                                                                                                                                                                                      • String ID: .tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsy2C04.tmp$C:\Users\user\Desktop\Setup.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                                                                                                                                                                                      • API String ID: 2292928366-1935044647
                                                                                                                                                                                                                                                      • Opcode ID: a9950f16e1a4a62c6ded3d55c7a98e4382dcb346a085109a7b13f69721f27fd6
                                                                                                                                                                                                                                                      • Instruction ID: 4d4dc0a58e4858e72561def8a0259f0227da8af974c10a5ea2b310ef4b80d7a5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a9950f16e1a4a62c6ded3d55c7a98e4382dcb346a085109a7b13f69721f27fd6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 66E10670A00214AADB10AFB59D45BAF3AB8EF4470AF14847FF545B22D1DB7C8A41CB6D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 141 4056de-4056f9 142 405888-40588f 141->142 143 4056ff-4057c6 GetDlgItem * 3 call 4044ce call 404e27 GetClientRect GetSystemMetrics SendMessageW * 2 141->143 145 405891-4058b3 GetDlgItem CreateThread CloseHandle 142->145 146 4058b9-4058c6 142->146 165 4057e4-4057e7 143->165 166 4057c8-4057e2 SendMessageW * 2 143->166 145->146 148 4058e4-4058ee 146->148 149 4058c8-4058ce 146->149 150 4058f0-4058f6 148->150 151 405944-405948 148->151 153 4058d0-4058df ShowWindow * 2 call 4044ce 149->153 154 405909-405912 call 404500 149->154 155 4058f8-405904 call 404472 150->155 156 40591e-40592e ShowWindow 150->156 151->154 159 40594a-405950 151->159 153->148 162 405917-40591b 154->162 155->154 163 405930-405939 call 40559f 156->163 164 40593e-40593f call 404472 156->164 159->154 167 405952-405965 SendMessageW 159->167 163->164 164->151 170 4057f7-40580e call 404499 165->170 171 4057e9-4057f5 SendMessageW 165->171 166->165 172 405a67-405a69 167->172 173 40596b-405996 CreatePopupMenu call 40657a AppendMenuW 167->173 180 405810-405824 ShowWindow 170->180 181 405844-405865 GetDlgItem SendMessageW 170->181 171->170 172->162 178 405998-4059a8 GetWindowRect 173->178 179 4059ab-4059c0 TrackPopupMenu 173->179 178->179 179->172 182 4059c6-4059dd 179->182 183 405833 180->183 184 405826-405831 ShowWindow 180->184 181->172 185 40586b-405883 SendMessageW * 2 181->185 186 4059e2-4059fd SendMessageW 182->186 187 405839-40583f call 4044ce 183->187 184->187 185->172 186->186 188 4059ff-405a22 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 186->188 187->181 190 405a24-405a4b SendMessageW 188->190 190->190 191 405a4d-405a61 GlobalUnlock SetClipboardData CloseClipboard 190->191 191->172
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000403), ref: 0040573C
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040574B
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00405788
                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000002), ref: 0040578F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B0
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C1
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057D4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E2
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057F5
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405817
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 0040582B
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040584C
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040585C
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405875
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405881
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040575A
                                                                                                                                                                                                                                                        • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040589E
                                                                                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00005672,00000000), ref: 004058AC
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 004058B3
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 004058D7
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00030432,00000008), ref: 004058DC
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000008), ref: 00405926
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040595A
                                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 0040596B
                                                                                                                                                                                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040597F
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 0040599F
                                                                                                                                                                                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059B8
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F0
                                                                                                                                                                                                                                                      • OpenClipboard.USER32(00000000), ref: 00405A00
                                                                                                                                                                                                                                                      • EmptyClipboard.USER32 ref: 00405A06
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A12
                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00405A1C
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A30
                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405A50
                                                                                                                                                                                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405A5B
                                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00405A61
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                                                                                                                                      • String ID: {
                                                                                                                                                                                                                                                      • API String ID: 590372296-366298937
                                                                                                                                                                                                                                                      • Opcode ID: c8ef7bbbe888f33c7642292c9829dc0fe895fcac448e4408b73d3b9779d96911
                                                                                                                                                                                                                                                      • Instruction ID: 6b97441d6f4cfe62a880681573964a63c423f2dd70b2063085686802d9cc5617
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c8ef7bbbe888f33c7642292c9829dc0fe895fcac448e4408b73d3b9779d96911
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C8B169B1900608FFDB119FA0DD85AAE7B79FB44355F00803AFA41BA1A0C7755E51DF58

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 498 405c49-405c6f call 405f14 501 405c71-405c83 DeleteFileW 498->501 502 405c88-405c8f 498->502 503 405e05-405e09 501->503 504 405c91-405c93 502->504 505 405ca2-405cb2 call 40653d 502->505 506 405db3-405db8 504->506 507 405c99-405c9c 504->507 513 405cc1-405cc2 call 405e58 505->513 514 405cb4-405cbf lstrcatW 505->514 506->503 509 405dba-405dbd 506->509 507->505 507->506 511 405dc7-405dcf call 406873 509->511 512 405dbf-405dc5 509->512 511->503 522 405dd1-405de5 call 405e0c call 405c01 511->522 512->503 516 405cc7-405ccb 513->516 514->516 518 405cd7-405cdd lstrcatW 516->518 519 405ccd-405cd5 516->519 521 405ce2-405cfe lstrlenW FindFirstFileW 518->521 519->518 519->521 523 405d04-405d0c 521->523 524 405da8-405dac 521->524 538 405de7-405dea 522->538 539 405dfd-405e00 call 40559f 522->539 526 405d2c-405d40 call 40653d 523->526 527 405d0e-405d16 523->527 524->506 529 405dae 524->529 540 405d42-405d4a 526->540 541 405d57-405d62 call 405c01 526->541 530 405d18-405d20 527->530 531 405d8b-405d9b FindNextFileW 527->531 529->506 530->526 534 405d22-405d2a 530->534 531->523 537 405da1-405da2 FindClose 531->537 534->526 534->531 537->524 538->512 544 405dec-405dfb call 40559f call 4062fd 538->544 539->503 540->531 545 405d4c-405d55 call 405c49 540->545 549 405d83-405d86 call 40559f 541->549 550 405d64-405d67 541->550 544->503 545->531 549->531 553 405d69-405d79 call 40559f call 4062fd 550->553 554 405d7b-405d81 550->554 553->531 554->531
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,76113420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C72
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz155E.tmp\*.*,\*.*,C:\Users\user\AppData\Local\Temp\nsz155E.tmp\*.*,?,?,76113420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CBA
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsz155E.tmp\*.*,?,?,76113420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CDD
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsz155E.tmp\*.*,?,?,76113420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CE3
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz155E.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsz155E.tmp\*.*,?,?,76113420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CF3
                                                                                                                                                                                                                                                      • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D93
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00405DA2
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                                                                                                      • String ID: .$.$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsz155E.tmp\*.*$\*.*
                                                                                                                                                                                                                                                      • API String ID: 2035342205-318818092
                                                                                                                                                                                                                                                      • Opcode ID: d4824498ca5d4646401654330336f54dc3516ea2401a274e156101c2699109e4
                                                                                                                                                                                                                                                      • Instruction ID: 8b2ee76931e9ba666d6dc67a471f1b560bbb00ea1adf29c264b32972d7114dcf
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d4824498ca5d4646401654330336f54dc3516ea2401a274e156101c2699109e4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3D41A130900A14BADB216B65CC8DABF7678DF81714F14817FF841B21D1D77C4A819EAE
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(76113420,004302B8,C:\,00405F5D,C:\,C:\,00000000,C:\,C:\,76113420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76113420,C:\Users\user\AppData\Local\Temp\), ref: 0040687E
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0040688A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                                      • String ID: C:\
                                                                                                                                                                                                                                                      • API String ID: 2295610775-3404278061
                                                                                                                                                                                                                                                      • Opcode ID: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                                                                                                                                                                                                                                      • Instruction ID: 67599a3b69382adcf67454a25bfea179debcebd0a6e2e92eb77ede12202c023a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C3D012325192205FC3402B386E0C84B7A989F16331726CB76B4AAF51E0D7388C7387BD

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 192 403f9a-403fac 193 403fb2-403fb8 192->193 194 404113-404122 192->194 193->194 195 403fbe-403fc7 193->195 196 404171-404186 194->196 197 404124-40416c GetDlgItem * 2 call 404499 SetClassLongW call 40140b 194->197 200 403fc9-403fd6 SetWindowPos 195->200 201 403fdc-403fe3 195->201 198 4041c6-4041cb call 4044e5 196->198 199 404188-40418b 196->199 197->196 214 4041d0-4041eb 198->214 203 40418d-404198 call 401389 199->203 204 4041be-4041c0 199->204 200->201 206 403fe5-403fff ShowWindow 201->206 207 404027-40402d 201->207 203->204 228 40419a-4041b9 SendMessageW 203->228 204->198 213 404466 204->213 215 404100-40410e call 404500 206->215 216 404005-404018 GetWindowLongW 206->216 209 404046-404049 207->209 210 40402f-404041 DestroyWindow 207->210 220 40404b-404057 SetWindowLongW 209->220 221 40405c-404062 209->221 217 404443-404449 210->217 219 404468-40446f 213->219 224 4041f4-4041fa 214->224 225 4041ed-4041ef call 40140b 214->225 215->219 216->215 226 40401e-404021 ShowWindow 216->226 217->213 231 40444b-404451 217->231 220->219 221->215 227 404068-404077 GetDlgItem 221->227 232 404200-40420b 224->232 233 404424-40443d DestroyWindow KiUserCallbackDispatcher 224->233 225->224 226->207 235 404096-404099 227->235 236 404079-404090 SendMessageW IsWindowEnabled 227->236 228->219 231->213 237 404453-40445c ShowWindow 231->237 232->233 234 404211-40425e call 40657a call 404499 * 3 GetDlgItem 232->234 233->217 264 404260-404265 234->264 265 404268-4042a4 ShowWindow KiUserCallbackDispatcher call 4044bb KiUserCallbackDispatcher 234->265 239 40409b-40409c 235->239 240 40409e-4040a1 235->240 236->213 236->235 237->213 242 4040cc-4040d1 call 404472 239->242 243 4040a3-4040a9 240->243 244 4040af-4040b4 240->244 242->215 247 4040ea-4040fa SendMessageW 243->247 248 4040ab-4040ad 243->248 244->247 249 4040b6-4040bc 244->249 247->215 248->242 252 4040d3-4040dc call 40140b 249->252 253 4040be-4040c4 call 40140b 249->253 252->215 262 4040de-4040e8 252->262 260 4040ca 253->260 260->242 262->260 264->265 268 4042a6-4042a7 265->268 269 4042a9 265->269 270 4042ab-4042d9 GetSystemMenu EnableMenuItem SendMessageW 268->270 269->270 271 4042db-4042ec SendMessageW 270->271 272 4042ee 270->272 273 4042f4-404333 call 4044ce call 403f7b call 40653d lstrlenW call 40657a SetWindowTextW call 401389 271->273 272->273 273->214 284 404339-40433b 273->284 284->214 285 404341-404345 284->285 286 404364-404378 DestroyWindow 285->286 287 404347-40434d 285->287 286->217 289 40437e-4043ab CreateDialogParamW 286->289 287->213 288 404353-404359 287->288 288->214 290 40435f 288->290 289->217 291 4043b1-404408 call 404499 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 289->291 290->213 291->213 296 40440a-40441d ShowWindow call 4044e5 291->296 298 404422 296->298 298->217
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FD6
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?), ref: 00403FF6
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404008
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000004), ref: 00404021
                                                                                                                                                                                                                                                      • DestroyWindow.USER32 ref: 00404035
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040404E
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,?), ref: 0040406D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404081
                                                                                                                                                                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 00404088
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00404133
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 0040413D
                                                                                                                                                                                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00404157
                                                                                                                                                                                                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041A8
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000003), ref: 0040424E
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?), ref: 0040426F
                                                                                                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404281
                                                                                                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040429C
                                                                                                                                                                                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042B2
                                                                                                                                                                                                                                                      • EnableMenuItem.USER32(00000000), ref: 004042B9
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042D1
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042E4
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(0042D268,?,0042D268,00000000), ref: 0040430E
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,0042D268), ref: 00404322
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,0000000A), ref: 00404456
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Item$MessageSendShow$Long$CallbackDispatcherMenuUser$ClassDestroyEnableEnabledSystemTextlstrlen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3964124867-0
                                                                                                                                                                                                                                                      • Opcode ID: e7f11a10533a611f3fe78e549378f399a66bd747c21cf404ab37e5123baac86e
                                                                                                                                                                                                                                                      • Instruction ID: 19e8ffe36521fda3862950d2389d84f1ef0c133ac5ff71005f69e3a94542e2f3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e7f11a10533a611f3fe78e549378f399a66bd747c21cf404ab37e5123baac86e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DDC1A1B1A00704ABDB206F61EE49E2B3A68FB84746F15053EF741B61F1CB799841DB2D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 299 403bec-403c04 call 40690a 302 403c06-403c16 call 406484 299->302 303 403c18-403c4f call 40640b 299->303 312 403c72-403c9b call 403ec2 call 405f14 302->312 308 403c51-403c62 call 40640b 303->308 309 403c67-403c6d lstrcatW 303->309 308->309 309->312 317 403ca1-403ca6 312->317 318 403d2d-403d35 call 405f14 312->318 317->318 319 403cac-403cd4 call 40640b 317->319 324 403d43-403d68 LoadImageW 318->324 325 403d37-403d3e call 40657a 318->325 319->318 326 403cd6-403cda 319->326 328 403de9-403df1 call 40140b 324->328 329 403d6a-403d9a RegisterClassW 324->329 325->324 330 403cec-403cf8 lstrlenW 326->330 331 403cdc-403ce9 call 405e39 326->331 343 403df3-403df6 328->343 344 403dfb-403e06 call 403ec2 328->344 332 403da0-403de4 SystemParametersInfoW CreateWindowExW 329->332 333 403eb8 329->333 337 403d20-403d28 call 405e0c call 40653d 330->337 338 403cfa-403d08 lstrcmpiW 330->338 331->330 332->328 336 403eba-403ec1 333->336 337->318 338->337 342 403d0a-403d14 GetFileAttributesW 338->342 347 403d16-403d18 342->347 348 403d1a-403d1b call 405e58 342->348 343->336 352 403e0c-403e26 ShowWindow call 40689a 344->352 353 403e8f-403e90 call 405672 344->353 347->337 347->348 348->337 360 403e32-403e44 GetClassInfoW 352->360 361 403e28-403e2d call 40689a 352->361 356 403e95-403e97 353->356 358 403eb1-403eb3 call 40140b 356->358 359 403e99-403e9f 356->359 358->333 359->343 362 403ea5-403eac call 40140b 359->362 365 403e46-403e56 GetClassInfoW RegisterClassW 360->365 366 403e5c-403e7f DialogBoxParamW call 40140b 360->366 361->360 362->343 365->366 370 403e84-403e8d call 403b3c 366->370 370->336
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0040690A: GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                                                                                                                                                                                                                                        • Part of subcall function 0040690A: GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,76113420,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403C6D
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(Remove folder: ,?,?,?,Remove folder: ,00000000,00440800,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,76113420), ref: 00403CED
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,.exe,Remove folder: ,?,?,?,Remove folder: ,00000000,00440800,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 00403D00
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(Remove folder: ,?,00000000,?), ref: 00403D0B
                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00440800), ref: 00403D54
                                                                                                                                                                                                                                                        • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                                                                                                                                                                                                                                      • RegisterClassW.USER32(00433EA0), ref: 00403D91
                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DA9
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DDE
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403E14
                                                                                                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403E40
                                                                                                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403E4D
                                                                                                                                                                                                                                                      • RegisterClassW.USER32(00433EA0), ref: 00403E56
                                                                                                                                                                                                                                                      • DialogBoxParamW.USER32(?,00000000,00403F9A,00000000), ref: 00403E75
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                                                                      • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$Remove folder: $RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                                                                                                                                      • API String ID: 1975747703-586292101
                                                                                                                                                                                                                                                      • Opcode ID: b5e4680adf6fab30abf8c31c9b96982c96c1f128c8b6e65fe06ccfbd791f05a2
                                                                                                                                                                                                                                                      • Instruction ID: 6cc527b2f10929733706d009ff8c1d9b21e511251dd9cb17fe62514cef47010a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b5e4680adf6fab30abf8c31c9b96982c96c1f128c8b6e65fe06ccfbd791f05a2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F561A670140300BED721AF66ED46F2B3A6CEB84B5AF40453FF945B62E2CB7D59018A6D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 373 40307d-4030cb GetTickCount GetModuleFileNameW call 40602d 376 4030d7-403105 call 40653d call 405e58 call 40653d GetFileSize 373->376 377 4030cd-4030d2 373->377 385 4031f0-4031fe call 403019 376->385 386 40310b 376->386 378 4032ad-4032b1 377->378 392 403200-403203 385->392 393 403253-403258 385->393 388 403110-403127 386->388 390 403129 388->390 391 40312b-403134 call 4034cf 388->391 390->391 399 40325a-403262 call 403019 391->399 400 40313a-403141 391->400 395 403205-40321d call 4034e5 call 4034cf 392->395 396 403227-403251 GlobalAlloc call 4034e5 call 4032b4 392->396 393->378 395->393 419 40321f-403225 395->419 396->393 424 403264-403275 396->424 399->393 404 403143-403157 call 405fe8 400->404 405 4031bd-4031c1 400->405 410 4031cb-4031d1 404->410 422 403159-403160 404->422 409 4031c3-4031ca call 403019 405->409 405->410 409->410 415 4031e0-4031e8 410->415 416 4031d3-4031dd call 4069f7 410->416 415->388 423 4031ee 415->423 416->415 419->393 419->396 422->410 428 403162-403169 422->428 423->385 425 403277 424->425 426 40327d-403282 424->426 425->426 429 403283-403289 426->429 428->410 430 40316b-403172 428->430 429->429 431 40328b-4032a6 SetFilePointer call 405fe8 429->431 430->410 432 403174-40317b 430->432 436 4032ab 431->436 432->410 433 40317d-40319d 432->433 433->393 435 4031a3-4031a7 433->435 437 4031a9-4031ad 435->437 438 4031af-4031b7 435->438 436->378 437->423 437->438 438->410 439 4031b9-4031bb 438->439 439->410
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 0040308E
                                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Setup.exe,00000400,?,?,?,?,?,0040387D,?), ref: 004030AA
                                                                                                                                                                                                                                                        • Part of subcall function 0040602D: GetFileAttributesW.KERNEL32(00000003,004030BD,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                                                                                                                                                                                                                                        • Part of subcall function 0040602D: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00444000,00000000,00441800,00441800,C:\Users\user\Desktop\Setup.exe,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D), ref: 004030F6
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,}8@,?,?,?,?,?,0040387D,?), ref: 0040322C
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\Setup.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$}8@
                                                                                                                                                                                                                                                      • API String ID: 2803837635-356152588
                                                                                                                                                                                                                                                      • Opcode ID: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                                                                                                                                                                                                                                      • Instruction ID: 750c061bb954c4555836cecba7cc54c639b148d890841a972b43b12454d44aa7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7951B571904204AFDB10AF65ED42B9E7EACAB48756F14807BF904B62D1C77C9F408B9D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 440 40657a-406585 441 406587-406596 440->441 442 406598-4065ae 440->442 441->442 443 4065b0-4065bd 442->443 444 4065c6-4065cf 442->444 443->444 445 4065bf-4065c2 443->445 446 4065d5 444->446 447 4067aa-4067b5 444->447 445->444 448 4065da-4065e7 446->448 449 4067c0-4067c1 447->449 450 4067b7-4067bb call 40653d 447->450 448->447 451 4065ed-4065f6 448->451 450->449 453 406788 451->453 454 4065fc-406639 451->454 457 406796-406799 453->457 458 40678a-406794 453->458 455 40672c-406731 454->455 456 40663f-406646 454->456 462 406733-406739 455->462 463 406764-406769 455->463 459 406648-40664a 456->459 460 40664b-40664d 456->460 461 40679b-4067a4 457->461 458->461 459->460 464 40668a-40668d 460->464 465 40664f-406676 call 40640b 460->465 461->447 468 4065d7 461->468 469 406749-406755 call 40653d 462->469 470 40673b-406747 call 406484 462->470 466 406778-406786 lstrlenW 463->466 467 40676b-406773 call 40657a 463->467 474 40669d-4066a0 464->474 475 40668f-40669b GetSystemDirectoryW 464->475 485 406713-406717 465->485 486 40667c-406685 call 40657a 465->486 466->461 467->466 468->448 478 40675a-406760 469->478 470->478 481 4066a2-4066b0 GetWindowsDirectoryW 474->481 482 406709-40670b 474->482 480 40670d-406711 475->480 478->466 483 406762 478->483 480->485 487 406724-40672a call 4067c4 480->487 481->482 482->480 484 4066b2-4066ba 482->484 483->487 491 4066d1-4066e7 SHGetSpecialFolderLocation 484->491 492 4066bc-4066c5 484->492 485->487 488 406719-40671f lstrcatW 485->488 486->480 487->466 488->487 493 406705 491->493 494 4066e9-406703 SHGetPathFromIDListW CoTaskMemFree 491->494 497 4066cd-4066cf 492->497 493->482 494->480 494->493 497->480 497->491
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(Remove folder: ,00000400), ref: 00406695
                                                                                                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(Remove folder: ,00000400,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00000000,00424420,761123A0), ref: 004066A8
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Directory$SystemWindowslstrcatlstrlen
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsy2C04.tmp$Remove folder: $Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                                                                                                                                      • API String ID: 4260037668-1825706899
                                                                                                                                                                                                                                                      • Opcode ID: 71c82525ba0a65243e1f04eb87fe478d36a31e86dfe70ef8bf5ce9ddd18f012c
                                                                                                                                                                                                                                                      • Instruction ID: 685928b229c5d1fd60d609eb920d771e11fa4d776b5b66b0bad6c944a0f90ddf
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 71c82525ba0a65243e1f04eb87fe478d36a31e86dfe70ef8bf5ce9ddd18f012c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1D61D131900205EADB209F64DD80BAE77A5EF54318F22813BE907B72D0D77D99A1CB5D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 562 4032b4-4032cb 563 4032d4-4032dd 562->563 564 4032cd 562->564 565 4032e6-4032eb 563->565 566 4032df 563->566 564->563 567 4032fb-403308 call 4034cf 565->567 568 4032ed-4032f6 call 4034e5 565->568 566->565 572 4034bd 567->572 573 40330e-403312 567->573 568->567 574 4034bf-4034c0 572->574 575 403468-40346a 573->575 576 403318-403361 GetTickCount 573->576 579 4034c8-4034cc 574->579 577 4034aa-4034ad 575->577 578 40346c-40346f 575->578 580 4034c5 576->580 581 403367-40336f 576->581 585 4034b2-4034bb call 4034cf 577->585 586 4034af 577->586 578->580 582 403471 578->582 580->579 583 403371 581->583 584 403374-403382 call 4034cf 581->584 588 403474-40347a 582->588 583->584 584->572 596 403388-403391 584->596 585->572 594 4034c2 585->594 586->585 591 40347c 588->591 592 40347e-40348c call 4034cf 588->592 591->592 592->572 599 40348e-40349a call 4060df 592->599 594->580 598 403397-4033b7 call 406a65 596->598 604 403460-403462 598->604 605 4033bd-4033d0 GetTickCount 598->605 606 403464-403466 599->606 607 40349c-4034a6 599->607 604->574 608 4033d2-4033da 605->608 609 40341b-40341d 605->609 606->574 607->588 614 4034a8 607->614 610 4033e2-403418 MulDiv wsprintfW call 40559f 608->610 611 4033dc-4033e0 608->611 612 403454-403458 609->612 613 40341f-403423 609->613 610->609 611->609 611->610 612->581 618 40345e 612->618 616 403425-40342c call 4060df 613->616 617 40343a-403445 613->617 614->580 622 403431-403433 616->622 621 403448-40344c 617->621 618->580 621->598 623 403452 621->623 622->606 624 403435-403438 622->624 623->580 624->621
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CountTick$wsprintf
                                                                                                                                                                                                                                                      • String ID: *B$ DB$ A$ A$... %d%%$tClientRect$}8@
                                                                                                                                                                                                                                                      • API String ID: 551687249-400812307
                                                                                                                                                                                                                                                      • Opcode ID: 3bb00b159343602b5baf8216f2e6fd7ccfc314744640e4b330e170589aabe739
                                                                                                                                                                                                                                                      • Instruction ID: 54ab186c05730647c672001b6e56d135182c7b51176e178f40f708a1e84a381e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3bb00b159343602b5baf8216f2e6fd7ccfc314744640e4b330e170589aabe739
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E251BD31810219EBCF11DF65DA44B9E7BB8AF05756F10827BE804BB2C1D7789E44CBA9

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 625 40176f-401794 call 402da6 call 405e83 630 401796-40179c call 40653d 625->630 631 40179e-4017b0 call 40653d call 405e0c lstrcatW 625->631 636 4017b5-4017b6 call 4067c4 630->636 631->636 640 4017bb-4017bf 636->640 641 4017c1-4017cb call 406873 640->641 642 4017f2-4017f5 640->642 649 4017dd-4017ef 641->649 650 4017cd-4017db CompareFileTime 641->650 643 4017f7-4017f8 call 406008 642->643 644 4017fd-401819 call 40602d 642->644 643->644 652 40181b-40181e 644->652 653 40188d-4018b6 call 40559f call 4032b4 644->653 649->642 650->649 654 401820-40185e call 40653d * 2 call 40657a call 40653d call 405b9d 652->654 655 40186f-401879 call 40559f 652->655 665 4018b8-4018bc 653->665 666 4018be-4018ca SetFileTime 653->666 654->640 687 401864-401865 654->687 667 401882-401888 655->667 665->666 669 4018d0-4018db CloseHandle 665->669 666->669 670 402c33 667->670 673 4018e1-4018e4 669->673 674 402c2a-402c2d 669->674 675 402c35-402c39 670->675 677 4018e6-4018f7 call 40657a lstrcatW 673->677 678 4018f9-4018fc call 40657a 673->678 674->670 684 401901-4023a2 call 405b9d 677->684 678->684 684->674 684->675 687->667 689 401867-401868 687->689 689->655
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(00000000,00000000,get,00441000,?,?,00000031), ref: 004017B0
                                                                                                                                                                                                                                                      • CompareFileTime.KERNEL32(-00000014,?,get,get,00000000,00000000,get,00441000,?,?,00000031), ref: 004017D5
                                                                                                                                                                                                                                                        • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00403418,00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0), ref: 004055FA
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\), ref: 0040560C
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsz155E.tmp$C:\Users\user\AppData\Local\Temp\nsz155E.tmp\inetc.dll$get
                                                                                                                                                                                                                                                      • API String ID: 1941528284-3145632369
                                                                                                                                                                                                                                                      • Opcode ID: f7e64eeb5d3c4bf8a05a3440747446d68def3c8d7aa8c7c6583b7de4a42550af
                                                                                                                                                                                                                                                      • Instruction ID: 1e3f5e060805a06bac003644be00ba5f3fef1f2c353f2d3d357c0a6c5ca497fd
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f7e64eeb5d3c4bf8a05a3440747446d68def3c8d7aa8c7c6583b7de4a42550af
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F4419371900108BACF11BFB5DD85DAE7A79EF45768B20423FF422B10E2D63C8A91966D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 691 40559f-4055b4 692 4055ba-4055cb 691->692 693 40566b-40566f 691->693 694 4055d6-4055e2 lstrlenW 692->694 695 4055cd-4055d1 call 40657a 692->695 697 4055e4-4055f4 lstrlenW 694->697 698 4055ff-405603 694->698 695->694 697->693 699 4055f6-4055fa lstrcatW 697->699 700 405612-405616 698->700 701 405605-40560c SetWindowTextW 698->701 699->698 702 405618-40565a SendMessageW * 3 700->702 703 40565c-40565e 700->703 701->700 702->703 703->693 704 405660-405663 703->704 704->693
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00403418,00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0), ref: 004055FA
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\), ref: 0040560C
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                                                                                                                                                                                                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                                                                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                                                                                                                                                                                                                      • String ID: Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\
                                                                                                                                                                                                                                                      • API String ID: 1495540970-3229371147
                                                                                                                                                                                                                                                      • Opcode ID: 195069dcc2a5024ac29c7a45bf60c8768b6efe327543dfefb6c4dd5180e0e504
                                                                                                                                                                                                                                                      • Instruction ID: 138a2a903332092674924c4fce2a37a83712bc812e9b86ab44911e1df8857bb6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 195069dcc2a5024ac29c7a45bf60c8768b6efe327543dfefb6c4dd5180e0e504
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C1219071900558BACF11AFA9DD84DDFBF75EF45354F14803AF904B22A0C7794A419F68

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 705 4026ec-402705 call 402d84 708 402c2a-402c2d 705->708 709 40270b-402712 705->709 710 402c33-402c39 708->710 711 402714 709->711 712 402717-40271a 709->712 711->712 713 402720-40272f call 40649d 712->713 714 40287e-402886 712->714 713->714 718 402735 713->718 714->708 719 40273b-40273f 718->719 720 4027d4-4027d7 719->720 721 402745-402760 ReadFile 719->721 723 4027d9-4027dc 720->723 724 4027ef-4027ff call 4060b0 720->724 721->714 722 402766-40276b 721->722 722->714 726 402771-40277f 722->726 723->724 727 4027de-4027e9 call 40610e 723->727 724->714 733 402801 724->733 730 402785-402797 MultiByteToWideChar 726->730 731 40283a-402846 call 406484 726->731 727->714 727->724 730->733 734 402799-40279c 730->734 731->710 736 402804-402807 733->736 737 40279e-4027a9 734->737 736->731 739 402809-40280e 736->739 737->736 740 4027ab-4027d0 SetFilePointer MultiByteToWideChar 737->740 741 402810-402815 739->741 742 40284b-40284f 739->742 740->737 743 4027d2 740->743 741->742 746 402817-40282a 741->746 744 402851-402855 742->744 745 40286c-402878 SetFilePointer 742->745 743->733 747 402857-40285b 744->747 748 40285d-40286a 744->748 745->714 746->714 749 40282c-402832 746->749 747->745 747->748 748->714 749->719 750 402838 749->750 750->714
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                                                                                                                                                                                                                        • Part of subcall function 0040610E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406124
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                                                                                                                                      • String ID: 9
                                                                                                                                                                                                                                                      • API String ID: 163830602-2366072709
                                                                                                                                                                                                                                                      • Opcode ID: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                                                                                                                                                                                                                                      • Instruction ID: 36eba916602f65c1f8b814f2f26102ddc75cc08ed25eda7b441ea0696c55e726
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C551E975D00219AADF20EF95CA89AAEBB79FF04304F10817BE541B62D4D7B49D82CB58

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 751 40689a-4068ba GetSystemDirectoryW 752 4068bc 751->752 753 4068be-4068c0 751->753 752->753 754 4068d1-4068d3 753->754 755 4068c2-4068cb 753->755 757 4068d4-406907 wsprintfW LoadLibraryExW 754->757 755->754 756 4068cd-4068cf 755->756 756->757
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 004068EC
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406900
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                                                                                                                                      • String ID: %s%S.dll$UXTHEME$\
                                                                                                                                                                                                                                                      • API String ID: 2200240437-1946221925
                                                                                                                                                                                                                                                      • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                                                                                                                                                                                                      • Instruction ID: 21628a1c63ce2f140fdd4d546058f3b0ba52bdb51e88dcb335987c0e659eada7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D0F0F671511119ABDB10BB64DD0DF9B376CBF00305F10847AA646F10D0EB7CDA68CBA8

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 758 405a6e-405ab9 CreateDirectoryW 759 405abb-405abd 758->759 760 405abf-405acc GetLastError 758->760 761 405ae6-405ae8 759->761 760->761 762 405ace-405ae2 SetFileSecurityW 760->762 762->759 763 405ae4 GetLastError 762->763 763->761
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00405AC5
                                                                                                                                                                                                                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405ADA
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00405AE4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A94
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                                      • API String ID: 3449924974-3355392842
                                                                                                                                                                                                                                                      • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                                                                                                                                                                                                      • Instruction ID: 637b0a295f6611997b04f2fb2f8121e2d74ae93851c1d74b8ff7b710bfe1865b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1A010871D04219EAEF019BA0DD84BEFBBB4EB14314F00813AD545B6281E7789648CFE9

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 764 401d81-401d85 765 401d94-401d9a GetDlgItem 764->765 766 401d87-401d92 call 402d84 764->766 767 401da0-401dcc 765->767 766->767 770 401dd7 767->770 771 401dce-401dd5 call 402da6 767->771 773 401ddb-401e31 GetClientRect LoadImageW SendMessageW 770->773 771->773 775 401e33-401e36 773->775 776 401e3f-401e42 773->776 775->776 777 401e38-401e39 DeleteObject 775->777 778 401e48 776->778 779 402c2a-402c39 776->779 777->776 778->779
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                                                                                                                                                                                                      • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1849352358-0
                                                                                                                                                                                                                                                      • Opcode ID: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                                                                                                                                                                                                                                                      • Instruction ID: b69f8f45c5cbb28dd5603d9b1d667d2ce3d3910c133b75fee4ecc707c572ca23
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3321F672904119AFCB05DBA4DE45AEEBBB5EF08314F14003AFA45F62A0DB389951DB98

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 782 401c43-401c63 call 402d84 * 2 787 401c65-401c6c call 402da6 782->787 788 401c6f-401c73 782->788 787->788 790 401c75-401c7c call 402da6 788->790 791 401c7f-401c85 788->791 790->791 794 401cd3-401cfd call 402da6 * 2 FindWindowExW 791->794 795 401c87-401ca3 call 402d84 * 2 791->795 805 401d03 794->805 806 401cc3-401cd1 SendMessageW 795->806 807 401ca5-401cc1 SendMessageTimeoutW 795->807 808 401d06-401d09 805->808 806->805 807->808 809 402c2a-402c39 808->809 810 401d0f 808->810 810->809
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Timeout
                                                                                                                                                                                                                                                      • String ID: !
                                                                                                                                                                                                                                                      • API String ID: 1777923405-2657877971
                                                                                                                                                                                                                                                      • Opcode ID: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                                                                                                                                                                                                                                      • Instruction ID: 549e056fbb7746b1afa8e7352ee9f1cbf83a3633853e14f9ff1f16dc1dd81c22
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 46219C7190420AAFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz155E.tmp,00000023,00000011,00000002), ref: 004024D5
                                                                                                                                                                                                                                                      • RegSetValueExW.KERNEL32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsz155E.tmp,00000000,00000011,00000002), ref: 00402515
                                                                                                                                                                                                                                                      • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsz155E.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseValuelstrlen
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsz155E.tmp
                                                                                                                                                                                                                                                      • API String ID: 2655323295-1758848421
                                                                                                                                                                                                                                                      • Opcode ID: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                                                                                                                                                                                                                                                      • Instruction ID: a32c4fc66ba480c3aafb49ec1434dbeb720bd0d2787204a1d049ba7b64bbfaa1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8B118E71E00119BEEF10AFA5DE49EAEBAB8FF44358F15443AF504F61C1D7B88D40AA58
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                                                                                                                                                                                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(?,?,C:\,?,00405F2B,C:\,C:\,76113420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76113420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                                                                                                                                                                                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                                                                                                                                                                                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,76113420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76113420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F6D
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,76113420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76113420,C:\Users\user\AppData\Local\Temp\), ref: 00405F7D
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                                                                                                                                      • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                                      • API String ID: 3248276644-2214159804
                                                                                                                                                                                                                                                      • Opcode ID: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                                                                                                                                                                                                                                      • Instruction ID: e20fb510edeaf32ba19235dad054e15b0ffac27cf679254cac4fdbc394554759
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E3F0F426119D6226DB22333A5C05EAF0554CE9276475A023BF895B12C5DB3C8A43D8AE
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 0040607A
                                                                                                                                                                                                                                                      • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,?,0040352B,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406095
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CountFileNameTempTick
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                                                                                                                                                      • API String ID: 1716503409-944333549
                                                                                                                                                                                                                                                      • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                                                                                                                                                                                                      • Instruction ID: cc98cbd97bba9fac9576f26979179aa346a2ab2dc3c85b14509754d74f2b81c3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CEF09076B40204FBEB00CF69ED05E9EB7BCEB95750F11803AFA05F7140E6B499648768
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,76113420,00000000,C:\Users\user\AppData\Local\Temp\,00403B2F,00403A5E,?), ref: 00403B71
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00403B78
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B57
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Free$GlobalLibrary
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                                      • API String ID: 1100898210-3355392842
                                                                                                                                                                                                                                                      • Opcode ID: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                                                                                                                                                                                                                                      • Instruction ID: 19c5699a9bb8b3376c06320bd1355d3f7d45777e2bc9a3354ca833756e7661a4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 40E0EC3290212097C7615F55FE08B6E7B78AF49B26F05056AE884BB2628B746D428BDC
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00402103
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00403418,00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0), ref: 004055FA
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\), ref: 0040560C
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 334405425-0
                                                                                                                                                                                                                                                      • Opcode ID: 0bf0e5e813b2564cc7cfb612efcde4c797e71ce7d2922b3564d4c07743ad1514
                                                                                                                                                                                                                                                      • Instruction ID: d1cf9917c249e547a3b1759614bc69e8b445b1996c4dbd71fd6f6dd46acd7470
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0bf0e5e813b2564cc7cfb612efcde4c797e71ce7d2922b3564d4c07743ad1514
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2A21C231904104FACF11AFA5CE48A9D7A71BF48358F20413BF605B91E1DBBD8A82965D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(0087C620), ref: 00401C0B
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000804), ref: 00401C1D
                                                                                                                                                                                                                                                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                                                                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Global$AllocFreelstrcatlstrlen
                                                                                                                                                                                                                                                      • String ID: get
                                                                                                                                                                                                                                                      • API String ID: 3292104215-4248514160
                                                                                                                                                                                                                                                      • Opcode ID: f7499587b74b1f9cb3fce9f730428132cfcdd1475af0708a05741156e8f6fa82
                                                                                                                                                                                                                                                      • Instruction ID: 7c0f58a685d1fc6dd3685da305ee1819882fb4420ac17dc2787245939102450a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f7499587b74b1f9cb3fce9f730428132cfcdd1475af0708a05741156e8f6fa82
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1B21D872904210EBDB20AFA8EE84A5E73B4EB04715755063BF552F72D0D7B8AC414B9D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D1
                                                                                                                                                                                                                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E4
                                                                                                                                                                                                                                                      • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsz155E.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Enum$CloseValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 397863658-0
                                                                                                                                                                                                                                                      • Opcode ID: 89c6ceebaf26a2410158c75cc71a1e3b778611476644ea09d24f59567d4f9c93
                                                                                                                                                                                                                                                      • Instruction ID: 08080f496e1fbaad801da7c4a2f11cdf7a22a5a493a276a89d416976773fa01e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 89c6ceebaf26a2410158c75cc71a1e3b778611476644ea09d24f59567d4f9c93
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 89017CB1A04105ABEB159F94DE58AAEB66CEF40348F10403AF501B61C0EBB85E44966D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00406008: GetFileAttributesW.KERNEL32(?,?,00405C0D,?,?,00000000,00405DE3,?,?,?,?), ref: 0040600D
                                                                                                                                                                                                                                                        • Part of subcall function 00406008: SetFileAttributesW.KERNEL32(?,00000000), ref: 00406021
                                                                                                                                                                                                                                                      • RemoveDirectoryW.KERNEL32(?,?,?,00000000,00405DE3), ref: 00405C1C
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,00405DE3), ref: 00405C24
                                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C3C
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$Attributes$DeleteDirectoryRemove
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1655745494-0
                                                                                                                                                                                                                                                      • Opcode ID: 8eed124eda4cbc8430ddba83c09443e031bc029d4ce3365f7fb32bc961faff32
                                                                                                                                                                                                                                                      • Instruction ID: 0274c5225d47ddc366315f3a2fda4b694ad97aa72442a0e2fcdbaf00fd257d87
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8eed124eda4cbc8430ddba83c09443e031bc029d4ce3365f7fb32bc961faff32
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F4E0E53110CF9156E61457309E08F5F2AD8EF86715F05493EF892B10C0CBB848068E6A
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000408,?,00000000,004040D1), ref: 00404490
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                      • String ID: x
                                                                                                                                                                                                                                                      • API String ID: 3850602802-2363233923
                                                                                                                                                                                                                                                      • Opcode ID: 6afabcb65d7cd0472edcecb82606307073186cf957424f1b3ed57c3b76b5cfb8
                                                                                                                                                                                                                                                      • Instruction ID: 1b38e0d23eed931a714c5b599c5829f4d2050063c4158495342b67dc2c27a344
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6afabcb65d7cd0472edcecb82606307073186cf957424f1b3ed57c3b76b5cfb8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 10C01271140200EACB004B00DE01F0A7A20B7A0B02F209039F381210B087B05422DB0C
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(?,?,C:\,?,00405F2B,C:\,C:\,76113420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76113420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                                                                                                                                                                                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                                                                                                                                                                                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                                                                                                                                                                                                        • Part of subcall function 00405A6E: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,00441000,?,00000000,000000F0), ref: 0040164D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1892508949-0
                                                                                                                                                                                                                                                      • Opcode ID: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                                                                                                                                                                                                                                                      • Instruction ID: 910f9ca0e916fbda017ea5bccd1daba2d9720f9cae8b5c5670dceb894c5ef12e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3E11D031504110EBCF216FA5CD4099F36A0EF25369B28493BE945B52F1DA3E4A829A8E
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                                                                                                                                                                                                                                                      • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsz155E.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseQueryValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3356406503-0
                                                                                                                                                                                                                                                      • Opcode ID: 3fb0128ec3c0afb48f28764f09fc95c95f98cfbd5e462e7a9813c2ba4e742ed8
                                                                                                                                                                                                                                                      • Instruction ID: 3e5dab0bbcc9b7b4348569693e39c51bc0b27c59e8ea0ed6abb05ebc10b9b344
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3fb0128ec3c0afb48f28764f09fc95c95f98cfbd5e462e7a9813c2ba4e742ed8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5F116D71900219EADF14DFA4DA589AE77B4FF04345B20443BE401B62C0E7B88A45EB5D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00405B63: ShellExecuteExW.SHELL32(?), ref: 00405B72
                                                                                                                                                                                                                                                        • Part of subcall function 004069B5: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069C6
                                                                                                                                                                                                                                                        • Part of subcall function 004069B5: GetExitCodeProcess.KERNEL32(?,?), ref: 004069E8
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                                                                                                                                                                                                                                      • String ID: @
                                                                                                                                                                                                                                                      • API String ID: 165873841-2766056989
                                                                                                                                                                                                                                                      • Opcode ID: e9e6b888b2ac62b7866e10c79cc816c8736e15ae282fdec460a2aeb23ba8a534
                                                                                                                                                                                                                                                      • Instruction ID: 706d8f23dd4fc365793d21c3b3cee38f3579e955c6bce5a1691758ef83551cc9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e9e6b888b2ac62b7866e10c79cc816c8736e15ae282fdec460a2aeb23ba8a534
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 20115B71E042189ADB50EFB9CA49B8CB6F4BF04304F24447AE405F72C1EBBC89459B18
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                                      • Opcode ID: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                                                                                                                                                                                                                                      • Instruction ID: f98c5e72cab4da6dd47fcf147c12dc0649e5852bd482257a86ca63d172a8b8d6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0B01F4316202209FE7094B389D05B6A3698E710319F14823FF851F65F1EA78DC029B4C
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                                                                                                                                                                                                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$EnableShow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1136574915-0
                                                                                                                                                                                                                                                      • Opcode ID: 5ade1ed26a80a7dd8760c06c43378076533002221f41e68569be4ee1dd8de31a
                                                                                                                                                                                                                                                      • Instruction ID: ff95e9915c8c9942b49c08d49a5710ecdabad47c7be9b03b7ba0a01474a23479
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5ade1ed26a80a7dd8760c06c43378076533002221f41e68569be4ee1dd8de31a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E7E04872908211CFE705EBA4EE495AD77F4EF40325710497FE501F11D1DBB55D00965D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,00000000,00000000), ref: 00405B49
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00405B56
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3712363035-0
                                                                                                                                                                                                                                                      • Opcode ID: 4cad7792158b69fc064c933527736888f22fedd2346a68a48c9e5725d4d2403f
                                                                                                                                                                                                                                                      • Instruction ID: 0547baa0b497a95b6ed0e8f273b1969b1ac2c9598ef2001c301bcde660c6e2d6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4cad7792158b69fc064c933527736888f22fedd2346a68a48c9e5725d4d2403f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3EE092B4600209BFEB10AB64AE49F7B7AACEB04704F004565BA51E61A1DB78E8158A78
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                                                                                                                                                                                                                                        • Part of subcall function 0040689A: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                                                                                                                                                                                                                                        • Part of subcall function 0040689A: wsprintfW.USER32 ref: 004068EC
                                                                                                                                                                                                                                                        • Part of subcall function 0040689A: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406900
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2547128583-0
                                                                                                                                                                                                                                                      • Opcode ID: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                                                                                                                                                                                                                      • Instruction ID: 98bdf7d71c6046f852b78b75196177710d0a141037308efd39b2ac7baa162fea
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9FE0867390422066D21196745D44D7773A89B99750306443EF946F2090DB38DC31A76E
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000000B,00000001), ref: 00402C14
                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?), ref: 00402C24
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InvalidateMessageRectSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 909852535-0
                                                                                                                                                                                                                                                      • Opcode ID: 0509652848a83ac1d7feddac23dc24ced32f84c0220a85d8a6f2313ae5a63aab
                                                                                                                                                                                                                                                      • Instruction ID: 5efb85e177e5feb05262591b5578bbf68be0fc1facb886aaf0ec985341d6bcc2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0509652848a83ac1d7feddac23dc24ced32f84c0220a85d8a6f2313ae5a63aab
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CEE08C72700008FFEB01CBA4EE84DAEB779FB40315B00007AF502A00A0D7300D40DA28
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(00000003,004030BD,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$AttributesCreate
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 415043291-0
                                                                                                                                                                                                                                                      • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                                                                                                                                                                                                      • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,?,00405C0D,?,?,00000000,00405DE3,?,?,?,?), ref: 0040600D
                                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406021
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AttributesFile
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3188754299-0
                                                                                                                                                                                                                                                      • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                                                                                                                                                      • Instruction ID: c979a2e86073268fb5c10017c0603d576bb262e7e1663e1e1b2ee048d1a5e24b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34D012725041316FC2102728EF0C89BBF55EF643717014B35F9A5A22F0CB304C638A98
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(FFFFFFFF,00403A5E,?), ref: 00403B1D
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\nsz155E.tmp\, xrefs: 00403B31
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseHandle
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\
                                                                                                                                                                                                                                                      • API String ID: 2962429428-369848528
                                                                                                                                                                                                                                                      • Opcode ID: e86ec88962d2cddd060eb64ec5e150871475ae72b9f2b14f7d4b77a190cc5563
                                                                                                                                                                                                                                                      • Instruction ID: 74b342ff74dc5917d60848dc34610585f5de2c5243f802b65b47dd8438b48b4d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e86ec88962d2cddd060eb64ec5e150871475ae72b9f2b14f7d4b77a190cc5563
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5EC0123050470056D1646F749E4FE153B64AB4073EB600325B0F9B10F1CB3C5759895D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00405AFF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1375471231-0
                                                                                                                                                                                                                                                      • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                                                                                                                                                                                                      • Instruction ID: 33feed20cbbf131019f18849f7ccc9358209a8d33535326e0157453b6049084a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1BC04C30204501AED6105B609E48B177AA4DB50741F16843D6146E41E0DA789455EE2D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(00000000,?,00000000,?,?), ref: 004028AF
                                                                                                                                                                                                                                                        • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FilePointerwsprintf
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 327478801-0
                                                                                                                                                                                                                                                      • Opcode ID: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                                                                                                                                                                                                                                      • Instruction ID: a13d1cf18dcce6f7d85bed0b4e0fde0de6b16079219dfacd376ffc086bc6f252
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D3E09271A04105BFDB01EFA5AE499AEB3B8EF44319B10483BF102F00C1DA794D119B2D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegCreateKeyExW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 00406401
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Create
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2289755597-0
                                                                                                                                                                                                                                                      • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                                                                                                                                                                                                      • Instruction ID: ccab944935cfefb85f0e849ce69279fb55db75a3b7fb0960311cd9d36817041a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 04E0E6B2010109BFEF095F90DC0AD7B3B1DE704300F01892EFD06D4091E6B5AD306675
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403498,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 004060F3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileWrite
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3934441357-0
                                                                                                                                                                                                                                                      • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                                                                                                                                                      • Instruction ID: d8d859634201a592f38c73999a999f352708a9e59580de02994c407fa40ca669
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FAE08C3220026AABEF109E60DC04AEB3B6CFB00360F014837FA16E7081E270E93087A4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E2,00000000,00000000,00403306,000000FF,00000004,00000000,00000000,00000000), ref: 004060C4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileRead
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2738559852-0
                                                                                                                                                                                                                                                      • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                                                                                                                                                      • Instruction ID: 1583d2e05e1cff28e3594e7db3f0db2d88eef65457287744bb544c492d9958e5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AEE0EC322502AAABDF10AE65DC04AEB7B6CEB05361F018936FD16E6150E631E92197A4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegOpenKeyExW.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,00406438,?,00000000,?,?,Remove folder: ,?), ref: 004063CE
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Open
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 71445658-0
                                                                                                                                                                                                                                                      • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                                                                                                                                                                                      • Instruction ID: 4361357c0318622cec318f667d88df30c4c29b75262f7bca7234b06b46464da2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 83D0123210020EBBDF115F91AD01FAB3B5DAB08310F014426FE06E40A1D775D530A764
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                                                                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,?,00000000), ref: 004044B3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ItemTextlstrcatlstrlen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 281422827-0
                                                                                                                                                                                                                                                      • Opcode ID: 686190c6e4e1e5cc0914df72c0c951126eb576f2e70f28df627782bea9933419
                                                                                                                                                                                                                                                      • Instruction ID: 6ac98b26730712a62f5b3967fa7f39b4c61dbbfa6ef1674fce18da22a1fc1fc0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 686190c6e4e1e5cc0914df72c0c951126eb576f2e70f28df627782bea9933419
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D3C08C35008200BFD641A714EC42F0FB7A8FFA031AF00C42EB05CA10D1C63494208A2A
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(0002042A,00000000,00000000,00000000), ref: 004044F7
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                                      • Opcode ID: b985a0028b3d47d2300e38cb49a9103195f452c5c5dca8052d978926f7780193
                                                                                                                                                                                                                                                      • Instruction ID: 729772cd993a62bf3dcd5a53f5ba0c6067f9c4589e443fe2cdcdd0dddf41cb53
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b985a0028b3d47d2300e38cb49a9103195f452c5c5dca8052d978926f7780193
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 74C04CB1740605BADA108B509D45F0677546750701F188429B641A50E0CA74E410D62C
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ShellExecuteExW.SHELL32(?), ref: 00405B72
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExecuteShell
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 587946157-0
                                                                                                                                                                                                                                                      • Opcode ID: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                                                                                                                                                                                                                                      • Instruction ID: 155326c85e208380d9db810c36285a9e1b4200be200639c8195ffcf147e959ee
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BEC092B2000200EFE301CF80CB09F067BE8AF54306F028068E185DA060C7788840CB29
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                                      • Opcode ID: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                                                                                                                                                                                                                                      • Instruction ID: f9270ce27bc2d5d500308faa7c43699bdd9cec228278350af1c7ef3a72e6c056
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4FB01235181A00FBDE514B00DE09F857E62F7E4701F058038F341240F0CBB200A4DB08
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00403242,?,?,?,?,?,?,0040387D,?), ref: 004034F3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FilePointer
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 973152223-0
                                                                                                                                                                                                                                                      • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                                                                                                                                                      • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,00404292), ref: 004044C5
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CallbackDispatcherUser
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2492992576-0
                                                                                                                                                                                                                                                      • Opcode ID: 88c3b14432b04161d4e03979afc52f71aef4d1a500ec292a4d39f98dda9e77ac
                                                                                                                                                                                                                                                      • Instruction ID: 0db23a64e3c973129ccb7351ad80e5cfa0365495cc8a336c35755b545d17f2be
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 88c3b14432b04161d4e03979afc52f71aef4d1a500ec292a4d39f98dda9e77ac
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 74A00275508601DBDE115B51DF09D057B71A7547017414579A18551034C6314461EB5D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00403418,00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000,00424420,761123A0), ref: 004055FA
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\), ref: 0040560C
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                                                                                                                                                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                                                                                                                                                                                                        • Part of subcall function 00405B20: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,00000000,00000000), ref: 00405B49
                                                                                                                                                                                                                                                        • Part of subcall function 00405B20: CloseHandle.KERNEL32(?), ref: 00405B56
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                                                                                                                                                                                                        • Part of subcall function 004069B5: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069C6
                                                                                                                                                                                                                                                        • Part of subcall function 004069B5: GetExitCodeProcess.KERNEL32(?,?), ref: 004069E8
                                                                                                                                                                                                                                                        • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2972824698-0
                                                                                                                                                                                                                                                      • Opcode ID: 11aaa4362747121357e125e8dbb3e446f77891c3c0f7104508ea78bcc2682684
                                                                                                                                                                                                                                                      • Instruction ID: a015d294fcb9cc4e365613bb9e09bf6e78b00889af70ee47f703a6c6056ea9c8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 11aaa4362747121357e125e8dbb3e446f77891c3c0f7104508ea78bcc2682684
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2DF09072904112EBCB21BBA59A84EDE76E8DF01318F25403BE102B21D1D77C4E429A6E
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 004049D9
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00404A03
                                                                                                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404AB4
                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404ABF
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(Remove folder: ,0042D268,00000000,?,?), ref: 00404AF1
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(?,Remove folder: ), ref: 00404AFD
                                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B0F
                                                                                                                                                                                                                                                        • Part of subcall function 00405B81: GetDlgItemTextW.USER32(?,?,00000400,00404B46), ref: 00405B94
                                                                                                                                                                                                                                                        • Part of subcall function 004067C4: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76113420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                                                                                                                                                                                                                                        • Part of subcall function 004067C4: CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                                                                                                                                                                                                                                        • Part of subcall function 004067C4: CharNextW.USER32(?,00000000,76113420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                                                                                                                                                                                                                                        • Part of subcall function 004067C4: CharPrevW.USER32(?,?,76113420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                                                                                                                                                                                                                                      • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 00404BD2
                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BED
                                                                                                                                                                                                                                                        • Part of subcall function 00404D46: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                                                                                                                                                                                                                                        • Part of subcall function 00404D46: wsprintfW.USER32 ref: 00404DF0
                                                                                                                                                                                                                                                        • Part of subcall function 00404D46: SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                                                                      • String ID: A$C:\Users\user\AppData\Local\Temp\nsy2C04.tmp$Remove folder:
                                                                                                                                                                                                                                                      • API String ID: 2624150263-4029320013
                                                                                                                                                                                                                                                      • Opcode ID: aac53df244383e2a07a9d2c6e377dc106276e891bc31ab3524a37a2d2ad96109
                                                                                                                                                                                                                                                      • Instruction ID: a81e8b8b6ddc8ea4f7a7a45a10ce21cc850824e22f7b82fba9ad49fead82d7d1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aac53df244383e2a07a9d2c6e377dc106276e891bc31ab3524a37a2d2ad96109
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CBA191B1900208ABDB119FA6DD45AAFB7B8EF84314F10803BF601B62D1D77C9A41CB6D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(004085F0,?,00000001,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateInstance
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 542301482-0
                                                                                                                                                                                                                                                      • Opcode ID: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                                                                                                                                                                                                                                                      • Instruction ID: 5977cb51530078b600b156af0050786de557c4b464dd586e6a5beaa7a0440451
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A7411571A00208EFCF40DFE4C989E9D7BB5BF49348B20456AF905EB2D1DB799981CB94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileFindFirst
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1974802433-0
                                                                                                                                                                                                                                                      • Opcode ID: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                                                                                                                                                                                                                                                      • Instruction ID: 3f6fbcf0fd4d311cdd608d5f72697756ed96b8559223cd5d9f1c4d92bc61f1b3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3CF08271A04105EFD701DBA4ED49AAEB378FF14314F60417BE116F21D0E7B88E159B29
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                                                                                                                                                                                                                                      • Instruction ID: 3db1d01f4341fbbb805040525b4c18df43ce82c239752998d09602440244d977
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FEE18A71A0070ADFCB24CF59D880BAABBF5FB44305F15852EE496A72D1D338AA91CF45
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                                                                                                                                                                      • Instruction ID: 4d3fc1c80ea15bf86cc2801d6424e98614acddb7a54358772128df9d71e60e61
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C6C14871E042599BCF18CF68C8905EEBBB2BF88314F25866AD85677380D7347941CF95
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404F1E
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404F29
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F73
                                                                                                                                                                                                                                                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F8A
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000FC,00405513), ref: 00404FA3
                                                                                                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FB7
                                                                                                                                                                                                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FC9
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404FDF
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FEB
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FFD
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00405000
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040502B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405037
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D2
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405102
                                                                                                                                                                                                                                                        • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405116
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00405144
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405152
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000005), ref: 00405162
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040525D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C2
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052D7
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052FB
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040531B
                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00405330
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00405340
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053B9
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00405462
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405471
                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0040549C
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 004054EA
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 004054F5
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 004054FC
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                                                                                                      • String ID: $M$N
                                                                                                                                                                                                                                                      • API String ID: 2564846305-813528018
                                                                                                                                                                                                                                                      • Opcode ID: dd942b7cbeaa18c8cf4828e28d43e61687b6a80dcb186ef465745c56d9013c5d
                                                                                                                                                                                                                                                      • Instruction ID: 669472b6e39b4296dbb294a81ed98d86f32f22d8abeb4cff7518c6a892085abf
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dd942b7cbeaa18c8cf4828e28d43e61687b6a80dcb186ef465745c56d9013c5d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EF028A70900608EFDB20DFA9DD45AAF7BB5FB84314F10817AE610BA2E0D7799942DF58
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046F6
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040470A
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404727
                                                                                                                                                                                                                                                      • GetSysColor.USER32(?), ref: 00404738
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404746
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404754
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00404759
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404766
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040477B
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 004047D4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000), ref: 004047DB
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404806
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404849
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00404857
                                                                                                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 0040485A
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404873
                                                                                                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 00404876
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048A5
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048B7
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                                                                                                                                                                      • String ID: N$Remove folder:
                                                                                                                                                                                                                                                      • API String ID: 3103080414-3051863454
                                                                                                                                                                                                                                                      • Opcode ID: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                                                                                                                                                                                                                                      • Instruction ID: e0aa441e67ff77812dea5cfa76c138b5706349c0d06c8e95e02877fce1cb63d1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1A61A3B5900209BFDB10AF60DD85E6A7BA9FB44314F00843AFB05B62D0D778A951DF98
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                                                                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                                                                                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                                                                                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                                                                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                                                                                                                                      • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                                                                                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                                                                                                      • String ID: F
                                                                                                                                                                                                                                                      • API String ID: 941294808-1304234792
                                                                                                                                                                                                                                                      • Opcode ID: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                                                                                                                                                                                                                                      • Instruction ID: e457e53e67a16f607b198c8be77aa7e47a8fd9e6aa67a1a07366d16d1d2d9a76
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0E418B71800209AFCF058FA5DE459AF7FB9FF44315F04802AF991AA1A0C738AA55DFA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040631E,?,?), ref: 004061BE
                                                                                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061C7
                                                                                                                                                                                                                                                        • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                                                                                                                                                                                                                                        • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                                                                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(?,00431108,00000400), ref: 004061E4
                                                                                                                                                                                                                                                      • wsprintfA.USER32 ref: 00406202
                                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 0040623D
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 0040624C
                                                                                                                                                                                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406284
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062DA
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 004062EB
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F2
                                                                                                                                                                                                                                                        • Part of subcall function 0040602D: GetFileAttributesW.KERNEL32(00000003,004030BD,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                                                                                                                                                                                                                                        • Part of subcall function 0040602D: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                                                                                                                                                                      • String ID: %ls=%ls$[Rename]
                                                                                                                                                                                                                                                      • API String ID: 2171350718-461813615
                                                                                                                                                                                                                                                      • Opcode ID: 6dbc896bee28fc2cd17c6beb7c7e3b01e9a95bb407788db3ff507c40593cf796
                                                                                                                                                                                                                                                      • Instruction ID: 71978d88b6039f89b25a0dfa2ffa892efa56fbf884cfe692307f7793e751c739
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6dbc896bee28fc2cd17c6beb7c7e3b01e9a95bb407788db3ff507c40593cf796
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6A314670200716BBD2207B659D48F6B3A6CEF45754F15017EFA42F62C2EA3CA821867D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 0040451D
                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000000), ref: 0040455B
                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00404567
                                                                                                                                                                                                                                                      • SetBkMode.GDI32(?,?), ref: 00404573
                                                                                                                                                                                                                                                      • GetSysColor.USER32(?), ref: 00404586
                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,?), ref: 00404596
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 004045B0
                                                                                                                                                                                                                                                      • CreateBrushIndirect.GDI32(?), ref: 004045BA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2320649405-0
                                                                                                                                                                                                                                                      • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                                                                                                                                                      • Instruction ID: 19446832cb8519ea1938040ed984131457e28e93d0b00b9b4dc42373f0e33a15
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 382177B1500705AFCB31DF68DD08B5BBBF8AF41714B058A2EEA96B22E1C734E944CB54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76113420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                                                                                                                                                                                                                                      • CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                                                                                                                                                                                                                                      • CharNextW.USER32(?,00000000,76113420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                                                                                                                                                                                                                                      • CharPrevW.USER32(?,?,76113420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Char$Next$Prev
                                                                                                                                                                                                                                                      • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                                      • API String ID: 589700163-2977677972
                                                                                                                                                                                                                                                      • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                                                                                                                                                                                                                      • Instruction ID: 8e05d213a2b26a47bd0c986db1e6a85e10b5e067f284fb5e9645f7af11a9ce3c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7311862780161295DB313B158C44A77A2A8AF58798F56843FED86B32C1E77C8C9282AD
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E6F
                                                                                                                                                                                                                                                      • GetMessagePos.USER32 ref: 00404E77
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00404E91
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EA3
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EC9
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message$Send$ClientScreen
                                                                                                                                                                                                                                                      • String ID: f
                                                                                                                                                                                                                                                      • API String ID: 41195575-1993550816
                                                                                                                                                                                                                                                      • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                                                                                                                                                      • Instruction ID: 177f1d0b32132a6560496663958852c5fe6f1b23f9da62007dee57caca3d7f28
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34014C71900219BADB00DBA4DD85BFFBBB8AB54711F10012BBA50B61C0D7B49A058BA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDC.USER32(?), ref: 00401E51
                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                                                                                                                                                                                                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                                                                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                                                                      • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                                                                                                                                                                                                                      • String ID: MS Shell Dlg
                                                                                                                                                                                                                                                      • API String ID: 2584051700-76309092
                                                                                                                                                                                                                                                      • Opcode ID: 7613f5a947f4bbf8195753a17fba9eaca46e1d6fc564812dac8d5fa739d0f051
                                                                                                                                                                                                                                                      • Instruction ID: 78b13ae86a0973dc2b43aa2eb6c1af0beb3c1ef463c522f55250376beecb9f8a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7613f5a947f4bbf8195753a17fba9eaca46e1d6fc564812dac8d5fa739d0f051
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7001B571904241EFEB005BB0EE49B9A3FB4BB15301F108A39F541B71D2C7B904458BED
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(0002BCFB,00000064,0002E668), ref: 00402FDC
                                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 00402FEC
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00402FFC
                                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • verifying installer: %d%%, xrefs: 00402FE6
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                                                                                                      • String ID: verifying installer: %d%%
                                                                                                                                                                                                                                                      • API String ID: 1451636040-82062127
                                                                                                                                                                                                                                                      • Opcode ID: 34baaeb4f482044ab67dd7918236f7f229881b82dd6befd7adca30260b95ec65
                                                                                                                                                                                                                                                      • Instruction ID: eb17ebabde20c32bd565f0ca98bf5c3c7f8a04474e671541d9d17dad0456e96b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 34baaeb4f482044ab67dd7918236f7f229881b82dd6befd7adca30260b95ec65
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 20014B7064020DABEF209F60DE4AFEA3B79FB04345F008039FA06B51D0DBB999559F69
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00402A06
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2667972263-0
                                                                                                                                                                                                                                                      • Opcode ID: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                                                                                                                                                                                                                                      • Instruction ID: 8fc1a79e9ee36ebd610a2d663d7387b5f1fea8f48d7bc9e01940cd119f3fb53c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5831C271D00124BBCF216FA9CE49DDEBE79AF49364F14023AF450762E0CB794C429BA8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                                                                                                                                                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                                                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseEnum$DeleteValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1354259210-0
                                                                                                                                                                                                                                                      • Opcode ID: 8cb330a57336db5e00a931244e28e0c1e8cbbd051d222c2bd1499622aecedac4
                                                                                                                                                                                                                                                      • Instruction ID: ca6229ec891c5908b4c2d3bab14ae3db7b9396451d72a40731f1c02386a45f13
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8cb330a57336db5e00a931244e28e0c1e8cbbd051d222c2bd1499622aecedac4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DA215A7150010ABBEF119F90CE89EEF7B7DEB50384F100076F909B21A0D7B49E54AA68
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 00404DF0
                                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                                                                                                      • String ID: %u.%u%s%s
                                                                                                                                                                                                                                                      • API String ID: 3540041739-3551169577
                                                                                                                                                                                                                                                      • Opcode ID: f5c410226751388561f0977026f7bc113d9509f0ffdd9d2834ff72966f8c02b6
                                                                                                                                                                                                                                                      • Instruction ID: d7f2b51e3f2153b105aad6c1cbcae815e44f670c765de83d30fbb221df5484fa
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f5c410226751388561f0977026f7bc113d9509f0ffdd9d2834ff72966f8c02b6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AC11D573A041283BDB10656DAC45E9E369CAF81334F254237FA66F21D1EA78D91182E8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CharNextW.USER32(?,?,C:\,?,00405F2B,C:\,C:\,76113420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76113420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                                                                                                                                                                                                                                      • CharNextW.USER32(00000000), ref: 00405ECA
                                                                                                                                                                                                                                                      • CharNextW.USER32(00000000), ref: 00405EE2
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharNext
                                                                                                                                                                                                                                                      • String ID: C:\
                                                                                                                                                                                                                                                      • API String ID: 3213498283-3404278061
                                                                                                                                                                                                                                                      • Opcode ID: 389604e099afbb0f1c733809242fd9884b65eb47018f1a61235cb76474637dc7
                                                                                                                                                                                                                                                      • Instruction ID: b7f7aa27055ddc775a1b47344aef2f77b81fec2ea34db2f3ccdabfa21b6bce3d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 389604e099afbb0f1c733809242fd9884b65eb47018f1a61235cb76474637dc7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7BF0F631810E1296DB317B548C44E7B97BCEB64354B04843BD741B71C0D3BC8D808BDA
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E12
                                                                                                                                                                                                                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E1C
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405E2E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E0C
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                                      • API String ID: 2659869361-3355392842
                                                                                                                                                                                                                                                      • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                                                                                                                                                      • Instruction ID: 1a595bf39a0a3392b99637bd72bd9cca8666c17676e511d5d4bf90e80f698eee
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A8D0A731101930BAC2127B49EC08DDF62ACAE89340341443BF145B30A4CB7C5E5187FD
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz155E.tmp\inetc.dll), ref: 00402695
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: lstrlen
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsz155E.tmp$C:\Users\user\AppData\Local\Temp\nsz155E.tmp\inetc.dll
                                                                                                                                                                                                                                                      • API String ID: 1659193697-1882371206
                                                                                                                                                                                                                                                      • Opcode ID: fbd5ee5e4de60feb08ffa62b35b3018c7a91bb86716aa8782bbd76b946f17d50
                                                                                                                                                                                                                                                      • Instruction ID: edf8e5a6553ae7ef136857fb61bcac29e22bbc78049b19fa22ca3c34260198f3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fbd5ee5e4de60feb08ffa62b35b3018c7a91bb86716aa8782bbd76b946f17d50
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2611EB71A00215BBCB10BFB18E4AAAE7665AF40744F25443FE002B71C2EAFC8891565E
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000,004031F7,00000001,?,?,?,?,?,0040387D,?), ref: 0040302C
                                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 0040304A
                                                                                                                                                                                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040387D,?), ref: 00403075
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2102729457-0
                                                                                                                                                                                                                                                      • Opcode ID: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                                                                                                                                                                                                                                      • Instruction ID: 3364d2369d767f53e7c05e99e54cbc9c067443d5da9c9f227d7c3a258cba7bb7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A9F08270702A20AFC2316F50FE4998B7F68FB44B56741447AF446B15ACCB380DA2CB9D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 00405542
                                                                                                                                                                                                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405593
                                                                                                                                                                                                                                                        • Part of subcall function 004044E5: SendMessageW.USER32(0002042A,00000000,00000000,00000000), ref: 004044F7
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3748168415-3916222277
                                                                                                                                                                                                                                                      • Opcode ID: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                                                                                                                                                                                                                                      • Instruction ID: 904a7c61355239921aaa7855b64c86422fca6e8886f64d9e6fcbc6a993ea73ec
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F3017CB1100608BFDF209F11DD80AAB3B27EB84754F50453AFA01762D5D77A8E92DA69
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,?,00000000,?,?,Remove folder: ,?,?,00406672,80000002), ref: 00406451
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,00406672,80000002,Software\Microsoft\Windows\CurrentVersion,Remove folder: ,Remove folder: ,Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsz155E.tmp\), ref: 0040645C
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseQueryValue
                                                                                                                                                                                                                                                      • String ID: Remove folder:
                                                                                                                                                                                                                                                      • API String ID: 3356406503-1958208860
                                                                                                                                                                                                                                                      • Opcode ID: a598e195228f1036644e08b1753da052d1713cd74bd9ea8ab147b12b545f69e3
                                                                                                                                                                                                                                                      • Instruction ID: a8d415a3dc4e4479eaaa65942f717852bb8bd3539c12dad3b2e52d491ce509ba
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a598e195228f1036644e08b1753da052d1713cd74bd9ea8ab147b12b545f69e3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FB017C72510209AADF21CF51CC09EDB3BB8FB54364F01803AFD5AA6190D738D968DBA8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                                                                                                                                                                                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FBA
                                                                                                                                                                                                                                                      • CharNextA.USER32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCB
                                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.4780653540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780622555.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780680294.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4780705307.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.4781301993.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 190613189-0
                                                                                                                                                                                                                                                      • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                                                                                                                                                                                                      • Instruction ID: bd09551308ad338638525116890fdadd4ab1f465f5503068af61de479685a4e4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34F0C231604418FFC7029BA5CD0099EBBA8EF06250B2140AAF840FB210D678DE019BA9

                                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                                      Execution Coverage:20%
                                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                      Signature Coverage:0%
                                                                                                                                                                                                                                                      Total number of Nodes:1386
                                                                                                                                                                                                                                                      Total number of Limit Nodes:31
                                                                                                                                                                                                                                                      execution_graph 3224 403640 SetErrorMode GetVersionExW 3225 403692 GetVersionExW 3224->3225 3226 4036ca 3224->3226 3225->3226 3227 403723 3226->3227 3228 406a35 5 API calls 3226->3228 3314 4069c5 GetSystemDirectoryW 3227->3314 3228->3227 3230 403739 lstrlenA 3230->3227 3231 403749 3230->3231 3317 406a35 GetModuleHandleA 3231->3317 3234 406a35 5 API calls 3235 403757 3234->3235 3236 406a35 5 API calls 3235->3236 3237 403763 #17 OleInitialize SHGetFileInfoW 3236->3237 3323 406668 lstrcpynW 3237->3323 3240 4037b0 GetCommandLineW 3324 406668 lstrcpynW 3240->3324 3242 4037c2 3325 405f64 3242->3325 3245 4038f7 3246 40390b GetTempPathW 3245->3246 3329 40360f 3246->3329 3248 403923 3250 403927 GetWindowsDirectoryW lstrcatW 3248->3250 3251 40397d DeleteFileW 3248->3251 3249 405f64 CharNextW 3253 4037f9 3249->3253 3254 40360f 12 API calls 3250->3254 3339 4030d0 GetTickCount GetModuleFileNameW 3251->3339 3253->3245 3253->3249 3258 4038f9 3253->3258 3256 403943 3254->3256 3255 403990 3259 403b6c ExitProcess CoUninitialize 3255->3259 3261 403a45 3255->3261 3268 405f64 CharNextW 3255->3268 3256->3251 3257 403947 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3256->3257 3260 40360f 12 API calls 3257->3260 3426 406668 lstrcpynW 3258->3426 3263 403b91 3259->3263 3264 403b7c 3259->3264 3267 403975 3260->3267 3369 403d17 3261->3369 3265 403b99 GetCurrentProcess OpenProcessToken 3263->3265 3266 403c0f ExitProcess 3263->3266 3480 405cc8 3264->3480 3271 403bb0 LookupPrivilegeValueW AdjustTokenPrivileges 3265->3271 3272 403bdf 3265->3272 3267->3251 3267->3259 3283 4039b2 3268->3283 3271->3272 3276 406a35 5 API calls 3272->3276 3273 403a54 3273->3259 3279 403be6 3276->3279 3277 403a1b 3427 40603f 3277->3427 3278 403a5c 3443 405c33 3278->3443 3281 403bfb ExitWindowsEx 3279->3281 3285 403c08 3279->3285 3281->3266 3281->3285 3283->3277 3283->3278 3484 40140b 3285->3484 3288 403a72 lstrcatW 3289 403a7d lstrcatW lstrcmpiW 3288->3289 3289->3273 3290 403a9d 3289->3290 3292 403aa2 3290->3292 3293 403aa9 3290->3293 3446 405b99 CreateDirectoryW 3292->3446 3451 405c16 CreateDirectoryW 3293->3451 3294 403a3a 3442 406668 lstrcpynW 3294->3442 3299 403aae SetCurrentDirectoryW 3300 403ac0 3299->3300 3301 403acb 3299->3301 3454 406668 lstrcpynW 3300->3454 3455 406668 lstrcpynW 3301->3455 3306 403b19 CopyFileW 3310 403ad8 3306->3310 3307 403b63 3309 406428 36 API calls 3307->3309 3309->3273 3310->3307 3311 4066a5 17 API calls 3310->3311 3313 403b4d CloseHandle 3310->3313 3456 4066a5 3310->3456 3473 406428 MoveFileExW 3310->3473 3477 405c4b CreateProcessW 3310->3477 3311->3310 3313->3310 3315 4069e7 wsprintfW LoadLibraryExW 3314->3315 3315->3230 3318 406a51 3317->3318 3319 406a5b GetProcAddress 3317->3319 3320 4069c5 3 API calls 3318->3320 3321 403750 3319->3321 3322 406a57 3320->3322 3321->3234 3322->3319 3322->3321 3323->3240 3324->3242 3326 405f6a 3325->3326 3327 4037e8 CharNextW 3326->3327 3328 405f71 CharNextW 3326->3328 3327->3253 3328->3326 3487 4068ef 3329->3487 3331 403625 3331->3248 3332 40361b 3332->3331 3496 405f37 lstrlenW CharPrevW 3332->3496 3335 405c16 2 API calls 3336 403633 3335->3336 3499 406187 3336->3499 3503 406158 GetFileAttributesW CreateFileW 3339->3503 3341 403113 3368 403120 3341->3368 3504 406668 lstrcpynW 3341->3504 3343 403136 3505 405f83 lstrlenW 3343->3505 3347 403147 GetFileSize 3348 403241 3347->3348 3367 40315e 3347->3367 3510 40302e 3348->3510 3352 403286 GlobalAlloc 3355 40329d 3352->3355 3354 4032de 3356 40302e 32 API calls 3354->3356 3359 406187 2 API calls 3355->3359 3356->3368 3357 403267 3358 4035e2 ReadFile 3357->3358 3360 403272 3358->3360 3362 4032ae CreateFileW 3359->3362 3360->3352 3360->3368 3361 40302e 32 API calls 3361->3367 3363 4032e8 3362->3363 3362->3368 3525 4035f8 SetFilePointer 3363->3525 3365 4032f6 3526 403371 3365->3526 3367->3348 3367->3354 3367->3361 3367->3368 3541 4035e2 3367->3541 3368->3255 3370 406a35 5 API calls 3369->3370 3371 403d2b 3370->3371 3372 403d31 3371->3372 3373 403d43 3371->3373 3596 4065af wsprintfW 3372->3596 3597 406536 3373->3597 3377 403d92 lstrcatW 3378 403d41 3377->3378 3588 403fed 3378->3588 3379 406536 3 API calls 3379->3377 3382 40603f 18 API calls 3383 403dc4 3382->3383 3384 403e58 3383->3384 3386 406536 3 API calls 3383->3386 3385 40603f 18 API calls 3384->3385 3387 403e5e 3385->3387 3393 403df6 3386->3393 3388 403e6e LoadImageW 3387->3388 3389 4066a5 17 API calls 3387->3389 3390 403f14 3388->3390 3391 403e95 RegisterClassW 3388->3391 3389->3388 3395 40140b 2 API calls 3390->3395 3394 403ecb SystemParametersInfoW CreateWindowExW 3391->3394 3424 403f1e 3391->3424 3392 403e17 lstrlenW 3397 403e25 lstrcmpiW 3392->3397 3398 403e4b 3392->3398 3393->3384 3393->3392 3396 405f64 CharNextW 3393->3396 3394->3390 3399 403f1a 3395->3399 3400 403e14 3396->3400 3397->3398 3401 403e35 GetFileAttributesW 3397->3401 3402 405f37 3 API calls 3398->3402 3404 403fed 18 API calls 3399->3404 3399->3424 3400->3392 3403 403e41 3401->3403 3405 403e51 3402->3405 3403->3398 3406 405f83 2 API calls 3403->3406 3407 403f2b 3404->3407 3602 406668 lstrcpynW 3405->3602 3406->3398 3409 403f37 ShowWindow 3407->3409 3410 403fba 3407->3410 3411 4069c5 3 API calls 3409->3411 3603 40579d OleInitialize 3410->3603 3413 403f4f 3411->3413 3415 403f5d GetClassInfoW 3413->3415 3418 4069c5 3 API calls 3413->3418 3414 403fc0 3416 403fc4 3414->3416 3417 403fdc 3414->3417 3420 403f71 GetClassInfoW RegisterClassW 3415->3420 3421 403f87 DialogBoxParamW 3415->3421 3422 40140b 2 API calls 3416->3422 3416->3424 3419 40140b 2 API calls 3417->3419 3418->3415 3419->3424 3420->3421 3423 40140b 2 API calls 3421->3423 3422->3424 3425 403faf 3423->3425 3424->3273 3425->3424 3426->3246 3625 406668 lstrcpynW 3427->3625 3429 406050 3626 405fe2 CharNextW CharNextW 3429->3626 3432 403a27 3432->3259 3441 406668 lstrcpynW 3432->3441 3433 4068ef 5 API calls 3439 406066 3433->3439 3434 406097 lstrlenW 3435 4060a2 3434->3435 3434->3439 3436 405f37 3 API calls 3435->3436 3438 4060a7 GetFileAttributesW 3436->3438 3438->3432 3439->3432 3439->3434 3440 405f83 2 API calls 3439->3440 3632 40699e FindFirstFileW 3439->3632 3440->3434 3441->3294 3442->3261 3444 406a35 5 API calls 3443->3444 3445 403a61 lstrcatW 3444->3445 3445->3288 3445->3289 3447 403aa7 3446->3447 3448 405bea GetLastError 3446->3448 3447->3299 3448->3447 3449 405bf9 SetFileSecurityW 3448->3449 3449->3447 3450 405c0f GetLastError 3449->3450 3450->3447 3452 405c2a GetLastError 3451->3452 3453 405c26 3451->3453 3452->3453 3453->3299 3454->3301 3455->3310 3460 4066b2 3456->3460 3457 4068d5 3458 403b0d DeleteFileW 3457->3458 3637 406668 lstrcpynW 3457->3637 3458->3306 3458->3310 3460->3457 3461 4068a3 lstrlenW 3460->3461 3462 4067ba GetSystemDirectoryW 3460->3462 3465 406536 3 API calls 3460->3465 3466 4066a5 10 API calls 3460->3466 3467 4067cd GetWindowsDirectoryW 3460->3467 3468 406844 lstrcatW 3460->3468 3469 4066a5 10 API calls 3460->3469 3470 4068ef 5 API calls 3460->3470 3471 4067fc SHGetSpecialFolderLocation 3460->3471 3635 4065af wsprintfW 3460->3635 3636 406668 lstrcpynW 3460->3636 3461->3460 3462->3460 3465->3460 3466->3461 3467->3460 3468->3460 3469->3460 3470->3460 3471->3460 3472 406814 SHGetPathFromIDListW CoTaskMemFree 3471->3472 3472->3460 3474 406449 3473->3474 3475 40643c 3473->3475 3474->3310 3638 4062ae 3475->3638 3478 405c8a 3477->3478 3479 405c7e CloseHandle 3477->3479 3478->3310 3479->3478 3483 405cdd 3480->3483 3481 403b89 ExitProcess 3482 405cf1 MessageBoxIndirectW 3482->3481 3483->3481 3483->3482 3485 401389 2 API calls 3484->3485 3486 401420 3485->3486 3486->3266 3488 4068fc 3487->3488 3490 406972 3488->3490 3491 406965 CharNextW 3488->3491 3493 405f64 CharNextW 3488->3493 3494 406951 CharNextW 3488->3494 3495 406960 CharNextW 3488->3495 3489 406977 CharPrevW 3489->3490 3490->3489 3492 406998 3490->3492 3491->3488 3491->3490 3492->3332 3493->3488 3494->3488 3495->3491 3497 405f53 lstrcatW 3496->3497 3498 40362d 3496->3498 3497->3498 3498->3335 3500 406194 GetTickCount GetTempFileNameW 3499->3500 3501 40363e 3500->3501 3502 4061ca 3500->3502 3501->3248 3502->3500 3502->3501 3503->3341 3504->3343 3506 405f91 3505->3506 3507 40313c 3506->3507 3508 405f97 CharPrevW 3506->3508 3509 406668 lstrcpynW 3507->3509 3508->3506 3508->3507 3509->3347 3511 403057 3510->3511 3512 40303f 3510->3512 3514 403067 GetTickCount 3511->3514 3515 40305f 3511->3515 3513 403048 DestroyWindow 3512->3513 3518 40304f 3512->3518 3513->3518 3517 403075 3514->3517 3514->3518 3545 406a71 3515->3545 3519 4030aa CreateDialogParamW ShowWindow 3517->3519 3520 40307d 3517->3520 3518->3352 3518->3368 3544 4035f8 SetFilePointer 3518->3544 3519->3518 3520->3518 3549 403012 3520->3549 3522 40308b wsprintfW 3552 4056ca 3522->3552 3525->3365 3527 403380 SetFilePointer 3526->3527 3528 40339c 3526->3528 3527->3528 3563 403479 GetTickCount 3528->3563 3533 403479 42 API calls 3534 4033d3 3533->3534 3535 40343f ReadFile 3534->3535 3539 4033e2 3534->3539 3540 403439 3534->3540 3535->3540 3537 4061db ReadFile 3537->3539 3539->3537 3539->3540 3578 40620a WriteFile 3539->3578 3540->3368 3542 4061db ReadFile 3541->3542 3543 4035f5 3542->3543 3543->3367 3544->3357 3546 406a8e PeekMessageW 3545->3546 3547 406a84 DispatchMessageW 3546->3547 3548 406a9e 3546->3548 3547->3546 3548->3518 3550 403021 3549->3550 3551 403023 MulDiv 3549->3551 3550->3551 3551->3522 3553 4056e5 3552->3553 3554 4030a8 3552->3554 3555 405701 lstrlenW 3553->3555 3556 4066a5 17 API calls 3553->3556 3554->3518 3557 40572a 3555->3557 3558 40570f lstrlenW 3555->3558 3556->3555 3559 405730 SetWindowTextW 3557->3559 3560 40573d 3557->3560 3558->3554 3561 405721 lstrcatW 3558->3561 3559->3560 3560->3554 3562 405743 SendMessageW SendMessageW SendMessageW 3560->3562 3561->3557 3562->3554 3564 4035d1 3563->3564 3565 4034a7 3563->3565 3566 40302e 32 API calls 3564->3566 3580 4035f8 SetFilePointer 3565->3580 3573 4033a3 3566->3573 3568 4034b2 SetFilePointer 3572 4034d7 3568->3572 3569 4035e2 ReadFile 3569->3572 3571 40302e 32 API calls 3571->3572 3572->3569 3572->3571 3572->3573 3574 40620a WriteFile 3572->3574 3575 4035b2 SetFilePointer 3572->3575 3581 406bb0 3572->3581 3573->3540 3576 4061db ReadFile 3573->3576 3574->3572 3575->3564 3577 4033bc 3576->3577 3577->3533 3577->3540 3579 406228 3578->3579 3579->3539 3580->3568 3582 406bd5 3581->3582 3583 406bdd 3581->3583 3582->3572 3583->3582 3584 406c64 GlobalFree 3583->3584 3585 406c6d GlobalAlloc 3583->3585 3586 406ce4 GlobalAlloc 3583->3586 3587 406cdb GlobalFree 3583->3587 3584->3585 3585->3582 3585->3583 3586->3582 3586->3583 3587->3586 3589 404001 3588->3589 3610 4065af wsprintfW 3589->3610 3591 404072 3611 4040a6 3591->3611 3593 403da2 3593->3382 3594 404077 3594->3593 3595 4066a5 17 API calls 3594->3595 3595->3594 3596->3378 3614 4064d5 3597->3614 3600 403d73 3600->3377 3600->3379 3601 40656a RegQueryValueExW RegCloseKey 3601->3600 3602->3384 3618 404610 3603->3618 3605 4057e7 3606 404610 SendMessageW 3605->3606 3608 4057f9 OleUninitialize 3606->3608 3607 4057c0 3607->3605 3621 401389 3607->3621 3608->3414 3610->3591 3612 4066a5 17 API calls 3611->3612 3613 4040b4 SetWindowTextW 3612->3613 3613->3594 3615 4064e4 3614->3615 3616 4064e8 3615->3616 3617 4064ed RegOpenKeyExW 3615->3617 3616->3600 3616->3601 3617->3616 3619 404628 3618->3619 3620 404619 SendMessageW 3618->3620 3619->3607 3620->3619 3623 401390 3621->3623 3622 4013fe 3622->3607 3623->3622 3624 4013cb MulDiv SendMessageW 3623->3624 3624->3623 3625->3429 3627 405fff 3626->3627 3629 406011 3626->3629 3628 40600c CharNextW 3627->3628 3627->3629 3631 406035 3628->3631 3630 405f64 CharNextW 3629->3630 3629->3631 3630->3629 3631->3432 3631->3433 3633 4069b4 FindClose 3632->3633 3634 4069bf 3632->3634 3633->3634 3634->3439 3635->3460 3636->3460 3637->3458 3639 406304 GetShortPathNameW 3638->3639 3640 4062de 3638->3640 3641 406423 3639->3641 3642 406319 3639->3642 3665 406158 GetFileAttributesW CreateFileW 3640->3665 3641->3474 3642->3641 3644 406321 wsprintfA 3642->3644 3646 4066a5 17 API calls 3644->3646 3645 4062e8 CloseHandle GetShortPathNameW 3645->3641 3647 4062fc 3645->3647 3648 406349 3646->3648 3647->3639 3647->3641 3666 406158 GetFileAttributesW CreateFileW 3648->3666 3650 406356 3650->3641 3651 406365 GetFileSize GlobalAlloc 3650->3651 3652 406387 3651->3652 3653 40641c CloseHandle 3651->3653 3654 4061db ReadFile 3652->3654 3653->3641 3655 40638f 3654->3655 3655->3653 3667 4060bd lstrlenA 3655->3667 3658 4063a6 lstrcpyA 3661 4063c8 3658->3661 3659 4063ba 3660 4060bd 4 API calls 3659->3660 3660->3661 3662 4063ff SetFilePointer 3661->3662 3663 40620a WriteFile 3662->3663 3664 406415 GlobalFree 3663->3664 3664->3653 3665->3645 3666->3650 3668 4060fe lstrlenA 3667->3668 3669 406106 3668->3669 3670 4060d7 lstrcmpiA 3668->3670 3669->3658 3669->3659 3670->3669 3671 4060f5 CharNextA 3670->3671 3671->3668 3672 401941 3673 401943 3672->3673 3678 402da6 3673->3678 3679 402db2 3678->3679 3680 4066a5 17 API calls 3679->3680 3681 402dd3 3680->3681 3682 401948 3681->3682 3683 4068ef 5 API calls 3681->3683 3684 405d74 3682->3684 3683->3682 3685 40603f 18 API calls 3684->3685 3686 405d94 3685->3686 3687 405d9c DeleteFileW 3686->3687 3688 405db3 3686->3688 3692 401951 3687->3692 3689 405ed3 3688->3689 3720 406668 lstrcpynW 3688->3720 3689->3692 3696 40699e 2 API calls 3689->3696 3691 405dd9 3693 405dec 3691->3693 3694 405ddf lstrcatW 3691->3694 3695 405f83 2 API calls 3693->3695 3697 405df2 3694->3697 3695->3697 3699 405ef8 3696->3699 3698 405e02 lstrcatW 3697->3698 3700 405e0d lstrlenW FindFirstFileW 3697->3700 3698->3700 3699->3692 3701 405f37 3 API calls 3699->3701 3700->3689 3718 405e2f 3700->3718 3702 405f02 3701->3702 3704 405d2c 5 API calls 3702->3704 3703 405eb6 FindNextFileW 3707 405ecc FindClose 3703->3707 3703->3718 3706 405f0e 3704->3706 3708 405f12 3706->3708 3709 405f28 3706->3709 3707->3689 3708->3692 3712 4056ca 24 API calls 3708->3712 3711 4056ca 24 API calls 3709->3711 3711->3692 3714 405f1f 3712->3714 3713 405d74 60 API calls 3713->3718 3716 406428 36 API calls 3714->3716 3715 4056ca 24 API calls 3715->3703 3716->3692 3717 4056ca 24 API calls 3717->3718 3718->3703 3718->3713 3718->3715 3718->3717 3719 406428 36 API calls 3718->3719 3721 406668 lstrcpynW 3718->3721 3722 405d2c 3718->3722 3719->3718 3720->3691 3721->3718 3730 406133 GetFileAttributesW 3722->3730 3725 405d47 RemoveDirectoryW 3728 405d55 3725->3728 3726 405d4f DeleteFileW 3726->3728 3727 405d59 3727->3718 3728->3727 3729 405d65 SetFileAttributesW 3728->3729 3729->3727 3731 405d38 3730->3731 3732 406145 SetFileAttributesW 3730->3732 3731->3725 3731->3726 3731->3727 3732->3731 3733 4015c1 3734 402da6 17 API calls 3733->3734 3735 4015c8 3734->3735 3736 405fe2 4 API calls 3735->3736 3748 4015d1 3736->3748 3737 401631 3738 401663 3737->3738 3739 401636 3737->3739 3743 401423 24 API calls 3738->3743 3752 401423 3739->3752 3740 405f64 CharNextW 3740->3748 3749 40165b 3743->3749 3745 405c16 2 API calls 3745->3748 3746 405c33 5 API calls 3746->3748 3747 40164a SetCurrentDirectoryW 3747->3749 3748->3737 3748->3740 3748->3745 3748->3746 3750 401617 GetFileAttributesW 3748->3750 3751 405b99 4 API calls 3748->3751 3750->3748 3751->3748 3753 4056ca 24 API calls 3752->3753 3754 401431 3753->3754 3755 406668 lstrcpynW 3754->3755 3755->3747 3992 401c43 3993 402d84 17 API calls 3992->3993 3994 401c4a 3993->3994 3995 402d84 17 API calls 3994->3995 3996 401c57 3995->3996 3997 402da6 17 API calls 3996->3997 3998 401c6c 3996->3998 3997->3998 3999 401c7c 3998->3999 4000 402da6 17 API calls 3998->4000 4001 401cd3 3999->4001 4002 401c87 3999->4002 4000->3999 4004 402da6 17 API calls 4001->4004 4003 402d84 17 API calls 4002->4003 4006 401c8c 4003->4006 4005 401cd8 4004->4005 4007 402da6 17 API calls 4005->4007 4008 402d84 17 API calls 4006->4008 4009 401ce1 FindWindowExW 4007->4009 4010 401c98 4008->4010 4013 401d03 4009->4013 4011 401cc3 SendMessageW 4010->4011 4012 401ca5 SendMessageTimeoutW 4010->4012 4011->4013 4012->4013 4021 4028c4 4022 4028ca 4021->4022 4023 4028d2 FindClose 4022->4023 4024 402c2a 4022->4024 4023->4024 4025 4040c5 4026 4040dd 4025->4026 4027 40423e 4025->4027 4026->4027 4028 4040e9 4026->4028 4029 40424f GetDlgItem GetDlgItem 4027->4029 4034 40428f 4027->4034 4031 4040f4 SetWindowPos 4028->4031 4032 404107 4028->4032 4113 4045c4 4029->4113 4030 4042e9 4035 404610 SendMessageW 4030->4035 4043 404239 4030->4043 4031->4032 4036 404110 ShowWindow 4032->4036 4037 404152 4032->4037 4034->4030 4042 401389 2 API calls 4034->4042 4065 4042fb 4035->4065 4044 404130 GetWindowLongW 4036->4044 4045 4041fc 4036->4045 4039 404171 4037->4039 4040 40415a DestroyWindow 4037->4040 4038 404279 SetClassLongW 4041 40140b 2 API calls 4038->4041 4047 404176 SetWindowLongW 4039->4047 4048 404187 4039->4048 4046 40454d 4040->4046 4041->4034 4049 4042c1 4042->4049 4044->4045 4051 404149 ShowWindow 4044->4051 4099 40462b 4045->4099 4046->4043 4058 40457e ShowWindow 4046->4058 4047->4043 4048->4045 4052 404193 GetDlgItem 4048->4052 4049->4030 4053 4042c5 SendMessageW 4049->4053 4051->4037 4056 4041c1 4052->4056 4057 4041a4 SendMessageW IsWindowEnabled 4052->4057 4053->4043 4054 40140b 2 API calls 4054->4065 4055 40454f DestroyWindow EndDialog 4055->4046 4060 4041ce 4056->4060 4063 404215 SendMessageW 4056->4063 4064 4041e1 4056->4064 4070 4041c6 4056->4070 4057->4043 4057->4056 4058->4043 4059 4066a5 17 API calls 4059->4065 4060->4063 4060->4070 4062 4045c4 18 API calls 4062->4065 4063->4045 4066 4041e9 4064->4066 4067 4041fe 4064->4067 4065->4043 4065->4054 4065->4055 4065->4059 4065->4062 4071 4045c4 18 API calls 4065->4071 4087 40448f DestroyWindow 4065->4087 4069 40140b 2 API calls 4066->4069 4068 40140b 2 API calls 4067->4068 4068->4070 4069->4070 4070->4045 4096 40459d 4070->4096 4072 404376 GetDlgItem 4071->4072 4073 404393 ShowWindow EnableWindow 4072->4073 4074 40438b 4072->4074 4116 4045e6 EnableWindow 4073->4116 4074->4073 4076 4043bd EnableWindow 4081 4043d1 4076->4081 4077 4043d6 GetSystemMenu EnableMenuItem SendMessageW 4078 404406 SendMessageW 4077->4078 4077->4081 4078->4081 4080 4040a6 18 API calls 4080->4081 4081->4077 4081->4080 4117 4045f9 SendMessageW 4081->4117 4118 406668 lstrcpynW 4081->4118 4083 404435 lstrlenW 4084 4066a5 17 API calls 4083->4084 4085 40444b SetWindowTextW 4084->4085 4086 401389 2 API calls 4085->4086 4086->4065 4087->4046 4088 4044a9 CreateDialogParamW 4087->4088 4088->4046 4089 4044dc 4088->4089 4090 4045c4 18 API calls 4089->4090 4091 4044e7 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4090->4091 4092 401389 2 API calls 4091->4092 4093 40452d 4092->4093 4093->4043 4094 404535 ShowWindow 4093->4094 4095 404610 SendMessageW 4094->4095 4095->4046 4097 4045a4 4096->4097 4098 4045aa SendMessageW 4096->4098 4097->4098 4098->4045 4100 4046ee 4099->4100 4101 404643 GetWindowLongW 4099->4101 4100->4043 4101->4100 4102 404658 4101->4102 4102->4100 4103 404685 GetSysColor 4102->4103 4104 404688 4102->4104 4103->4104 4105 404698 SetBkMode 4104->4105 4106 40468e SetTextColor 4104->4106 4107 4046b0 GetSysColor 4105->4107 4108 4046b6 4105->4108 4106->4105 4107->4108 4109 4046c7 4108->4109 4110 4046bd SetBkColor 4108->4110 4109->4100 4111 4046e1 CreateBrushIndirect 4109->4111 4112 4046da DeleteObject 4109->4112 4110->4109 4111->4100 4112->4111 4114 4066a5 17 API calls 4113->4114 4115 4045cf SetDlgItemTextW 4114->4115 4115->4038 4116->4076 4117->4081 4118->4083 4122 4016cc 4123 402da6 17 API calls 4122->4123 4124 4016d2 GetFullPathNameW 4123->4124 4125 4016ec 4124->4125 4131 40170e 4124->4131 4127 40699e 2 API calls 4125->4127 4125->4131 4126 401723 GetShortPathNameW 4128 402c2a 4126->4128 4129 4016fe 4127->4129 4129->4131 4132 406668 lstrcpynW 4129->4132 4131->4126 4131->4128 4132->4131 4133 401e4e GetDC 4134 402d84 17 API calls 4133->4134 4135 401e60 GetDeviceCaps MulDiv ReleaseDC 4134->4135 4136 402d84 17 API calls 4135->4136 4137 401e91 4136->4137 4138 4066a5 17 API calls 4137->4138 4139 401ece CreateFontIndirectW 4138->4139 4140 402638 4139->4140 4140->4140 3896 402950 3897 402da6 17 API calls 3896->3897 3899 40295c 3897->3899 3898 402972 3901 406133 2 API calls 3898->3901 3899->3898 3900 402da6 17 API calls 3899->3900 3900->3898 3902 402978 3901->3902 3924 406158 GetFileAttributesW CreateFileW 3902->3924 3904 402985 3905 402a3b 3904->3905 3906 4029a0 GlobalAlloc 3904->3906 3907 402a23 3904->3907 3908 402a42 DeleteFileW 3905->3908 3909 402a55 3905->3909 3906->3907 3910 4029b9 3906->3910 3911 403371 44 API calls 3907->3911 3908->3909 3925 4035f8 SetFilePointer 3910->3925 3913 402a30 CloseHandle 3911->3913 3913->3905 3914 4029bf 3915 4035e2 ReadFile 3914->3915 3916 4029c8 GlobalAlloc 3915->3916 3917 4029d8 3916->3917 3918 402a0c 3916->3918 3919 403371 44 API calls 3917->3919 3920 40620a WriteFile 3918->3920 3923 4029e5 3919->3923 3921 402a18 GlobalFree 3920->3921 3921->3907 3922 402a03 GlobalFree 3922->3918 3923->3922 3924->3904 3925->3914 4148 403cd5 4149 403ce0 4148->4149 4150 403ce4 4149->4150 4151 403ce7 GlobalAlloc 4149->4151 4151->4150 4152 401956 4153 402da6 17 API calls 4152->4153 4154 40195d lstrlenW 4153->4154 4155 402638 4154->4155 4156 4014d7 4157 402d84 17 API calls 4156->4157 4158 4014dd Sleep 4157->4158 4160 402c2a 4158->4160 3926 4020d8 3927 4020ea 3926->3927 3937 40219c 3926->3937 3928 402da6 17 API calls 3927->3928 3929 4020f1 3928->3929 3931 402da6 17 API calls 3929->3931 3930 401423 24 API calls 3933 4022f6 3930->3933 3932 4020fa 3931->3932 3934 402110 LoadLibraryExW 3932->3934 3935 402102 GetModuleHandleW 3932->3935 3936 402121 3934->3936 3934->3937 3935->3934 3935->3936 3946 406aa4 3936->3946 3937->3930 3940 402132 3943 401423 24 API calls 3940->3943 3944 402142 3940->3944 3941 40216b 3942 4056ca 24 API calls 3941->3942 3942->3944 3943->3944 3944->3933 3945 40218e FreeLibrary 3944->3945 3945->3933 3951 40668a WideCharToMultiByte 3946->3951 3948 406ac1 3949 406ac8 GetProcAddress 3948->3949 3950 40212c 3948->3950 3949->3950 3950->3940 3950->3941 3951->3948 4161 402b59 4162 402b60 4161->4162 4163 402bab 4161->4163 4165 402ba9 4162->4165 4167 402d84 17 API calls 4162->4167 4164 406a35 5 API calls 4163->4164 4166 402bb2 4164->4166 4168 402da6 17 API calls 4166->4168 4169 402b6e 4167->4169 4170 402bbb 4168->4170 4171 402d84 17 API calls 4169->4171 4170->4165 4172 402bbf IIDFromString 4170->4172 4174 402b7a 4171->4174 4172->4165 4173 402bce 4172->4173 4173->4165 4179 406668 lstrcpynW 4173->4179 4178 4065af wsprintfW 4174->4178 4177 402beb CoTaskMemFree 4177->4165 4178->4165 4179->4177 4180 402a5b 4181 402d84 17 API calls 4180->4181 4182 402a61 4181->4182 4183 402aa4 4182->4183 4184 402a88 4182->4184 4189 40292e 4182->4189 4186 402abe 4183->4186 4187 402aae 4183->4187 4185 402a8d 4184->4185 4193 402a9e 4184->4193 4194 406668 lstrcpynW 4185->4194 4188 4066a5 17 API calls 4186->4188 4190 402d84 17 API calls 4187->4190 4188->4193 4190->4193 4193->4189 4195 4065af wsprintfW 4193->4195 4194->4189 4195->4189 3975 40175c 3976 402da6 17 API calls 3975->3976 3977 401763 3976->3977 3978 406187 2 API calls 3977->3978 3979 40176a 3978->3979 3980 406187 2 API calls 3979->3980 3980->3979 4196 401d5d 4197 402d84 17 API calls 4196->4197 4198 401d6e SetWindowLongW 4197->4198 4199 402c2a 4198->4199 4200 4028de 4201 4028e6 4200->4201 4202 4028ea FindNextFileW 4201->4202 4204 4028fc 4201->4204 4203 402943 4202->4203 4202->4204 4206 406668 lstrcpynW 4203->4206 4206->4204 4207 406d5f 4213 406be3 4207->4213 4208 40754e 4209 406c64 GlobalFree 4210 406c6d GlobalAlloc 4209->4210 4210->4208 4210->4213 4211 406ce4 GlobalAlloc 4211->4208 4211->4213 4212 406cdb GlobalFree 4212->4211 4213->4208 4213->4209 4213->4210 4213->4211 4213->4212 4214 401563 4215 402ba4 4214->4215 4218 4065af wsprintfW 4215->4218 4217 402ba9 4218->4217 4219 401968 4220 402d84 17 API calls 4219->4220 4221 40196f 4220->4221 4222 402d84 17 API calls 4221->4222 4223 40197c 4222->4223 4224 402da6 17 API calls 4223->4224 4225 401993 lstrlenW 4224->4225 4227 4019a4 4225->4227 4226 4019e5 4227->4226 4231 406668 lstrcpynW 4227->4231 4229 4019d5 4229->4226 4230 4019da lstrlenW 4229->4230 4230->4226 4231->4229 4239 40166a 4240 402da6 17 API calls 4239->4240 4241 401670 4240->4241 4242 40699e 2 API calls 4241->4242 4243 401676 4242->4243 4244 402aeb 4245 402d84 17 API calls 4244->4245 4246 402af1 4245->4246 4247 4066a5 17 API calls 4246->4247 4248 40292e 4246->4248 4247->4248 4249 4026ec 4250 402d84 17 API calls 4249->4250 4251 4026fb 4250->4251 4252 402745 ReadFile 4251->4252 4253 4061db ReadFile 4251->4253 4255 402785 MultiByteToWideChar 4251->4255 4256 40283a 4251->4256 4258 4027ab SetFilePointer MultiByteToWideChar 4251->4258 4259 40284b 4251->4259 4261 402838 4251->4261 4262 406239 SetFilePointer 4251->4262 4252->4251 4252->4261 4253->4251 4255->4251 4271 4065af wsprintfW 4256->4271 4258->4251 4260 40286c SetFilePointer 4259->4260 4259->4261 4260->4261 4263 406255 4262->4263 4266 40626d 4262->4266 4264 4061db ReadFile 4263->4264 4265 406261 4264->4265 4265->4266 4267 406276 SetFilePointer 4265->4267 4268 40629e SetFilePointer 4265->4268 4266->4251 4267->4268 4269 406281 4267->4269 4268->4266 4270 40620a WriteFile 4269->4270 4270->4266 4271->4261 4272 404a6e 4273 404aa4 4272->4273 4274 404a7e 4272->4274 4276 40462b 8 API calls 4273->4276 4275 4045c4 18 API calls 4274->4275 4277 404a8b SetDlgItemTextW 4275->4277 4278 404ab0 4276->4278 4277->4273 3855 40176f 3856 402da6 17 API calls 3855->3856 3857 401776 3856->3857 3858 401796 3857->3858 3859 40179e 3857->3859 3894 406668 lstrcpynW 3858->3894 3895 406668 lstrcpynW 3859->3895 3862 40179c 3866 4068ef 5 API calls 3862->3866 3863 4017a9 3864 405f37 3 API calls 3863->3864 3865 4017af lstrcatW 3864->3865 3865->3862 3886 4017bb 3866->3886 3867 40699e 2 API calls 3867->3886 3868 406133 2 API calls 3868->3886 3870 4017cd CompareFileTime 3870->3886 3871 40188d 3873 4056ca 24 API calls 3871->3873 3872 401864 3874 4056ca 24 API calls 3872->3874 3882 401879 3872->3882 3875 401897 3873->3875 3874->3882 3876 403371 44 API calls 3875->3876 3877 4018aa 3876->3877 3878 4018be SetFileTime 3877->3878 3879 4018d0 CloseHandle 3877->3879 3878->3879 3881 4018e1 3879->3881 3879->3882 3880 4066a5 17 API calls 3880->3886 3884 4018e6 3881->3884 3885 4018f9 3881->3885 3883 406668 lstrcpynW 3883->3886 3887 4066a5 17 API calls 3884->3887 3888 4066a5 17 API calls 3885->3888 3886->3867 3886->3868 3886->3870 3886->3871 3886->3872 3886->3880 3886->3883 3889 405cc8 MessageBoxIndirectW 3886->3889 3893 406158 GetFileAttributesW CreateFileW 3886->3893 3890 4018ee lstrcatW 3887->3890 3891 401901 3888->3891 3889->3886 3890->3891 3892 405cc8 MessageBoxIndirectW 3891->3892 3892->3882 3893->3886 3894->3862 3895->3863 4279 401a72 4280 402d84 17 API calls 4279->4280 4281 401a7b 4280->4281 4282 402d84 17 API calls 4281->4282 4283 401a20 4282->4283 4284 401573 4285 401583 ShowWindow 4284->4285 4286 40158c 4284->4286 4285->4286 4287 402c2a 4286->4287 4288 40159a ShowWindow 4286->4288 4288->4287 4289 4023f4 4290 402da6 17 API calls 4289->4290 4291 402403 4290->4291 4292 402da6 17 API calls 4291->4292 4293 40240c 4292->4293 4294 402da6 17 API calls 4293->4294 4295 402416 GetPrivateProfileStringW 4294->4295 4296 4014f5 SetForegroundWindow 4297 402c2a 4296->4297 4298 401ff6 4299 402da6 17 API calls 4298->4299 4300 401ffd 4299->4300 4301 40699e 2 API calls 4300->4301 4302 402003 4301->4302 4304 402014 4302->4304 4305 4065af wsprintfW 4302->4305 4305->4304 4306 401b77 4307 402da6 17 API calls 4306->4307 4308 401b7e 4307->4308 4309 402d84 17 API calls 4308->4309 4310 401b87 wsprintfW 4309->4310 4311 402c2a 4310->4311 4312 4046fa lstrcpynW lstrlenW 4313 40167b 4314 402da6 17 API calls 4313->4314 4315 401682 4314->4315 4316 402da6 17 API calls 4315->4316 4317 40168b 4316->4317 4318 402da6 17 API calls 4317->4318 4319 401694 MoveFileW 4318->4319 4320 4016a0 4319->4320 4321 4016a7 4319->4321 4323 401423 24 API calls 4320->4323 4322 40699e 2 API calls 4321->4322 4325 4022f6 4321->4325 4324 4016b6 4322->4324 4323->4325 4324->4325 4326 406428 36 API calls 4324->4326 4326->4320 4334 4019ff 4335 402da6 17 API calls 4334->4335 4336 401a06 4335->4336 4337 402da6 17 API calls 4336->4337 4338 401a0f 4337->4338 4339 401a16 lstrcmpiW 4338->4339 4340 401a28 lstrcmpW 4338->4340 4341 401a1c 4339->4341 4340->4341 4342 4022ff 4343 402da6 17 API calls 4342->4343 4344 402305 4343->4344 4345 402da6 17 API calls 4344->4345 4346 40230e 4345->4346 4347 402da6 17 API calls 4346->4347 4348 402317 4347->4348 4349 40699e 2 API calls 4348->4349 4350 402320 4349->4350 4351 402331 lstrlenW lstrlenW 4350->4351 4352 402324 4350->4352 4354 4056ca 24 API calls 4351->4354 4353 4056ca 24 API calls 4352->4353 4356 40232c 4352->4356 4353->4356 4355 40236f SHFileOperationW 4354->4355 4355->4352 4355->4356 4357 401000 4358 401037 BeginPaint GetClientRect 4357->4358 4359 40100c DefWindowProcW 4357->4359 4361 4010f3 4358->4361 4362 401179 4359->4362 4363 401073 CreateBrushIndirect FillRect DeleteObject 4361->4363 4364 4010fc 4361->4364 4363->4361 4365 401102 CreateFontIndirectW 4364->4365 4366 401167 EndPaint 4364->4366 4365->4366 4367 401112 6 API calls 4365->4367 4366->4362 4367->4366 4368 401d81 4369 401d94 GetDlgItem 4368->4369 4370 401d87 4368->4370 4372 401d8e 4369->4372 4371 402d84 17 API calls 4370->4371 4371->4372 4373 401dd5 GetClientRect LoadImageW SendMessageW 4372->4373 4375 402da6 17 API calls 4372->4375 4376 401e33 4373->4376 4378 401e3f 4373->4378 4375->4373 4377 401e38 DeleteObject 4376->4377 4376->4378 4377->4378 4379 401503 4380 40150b 4379->4380 4382 40151e 4379->4382 4381 402d84 17 API calls 4380->4381 4381->4382 4383 404783 4384 40479b 4383->4384 4388 4048b5 4383->4388 4389 4045c4 18 API calls 4384->4389 4385 40491f 4386 4049e9 4385->4386 4387 404929 GetDlgItem 4385->4387 4394 40462b 8 API calls 4386->4394 4390 404943 4387->4390 4391 4049aa 4387->4391 4388->4385 4388->4386 4392 4048f0 GetDlgItem SendMessageW 4388->4392 4393 404802 4389->4393 4390->4391 4399 404969 SendMessageW LoadCursorW SetCursor 4390->4399 4391->4386 4395 4049bc 4391->4395 4416 4045e6 EnableWindow 4392->4416 4397 4045c4 18 API calls 4393->4397 4398 4049e4 4394->4398 4400 4049d2 4395->4400 4401 4049c2 SendMessageW 4395->4401 4403 40480f CheckDlgButton 4397->4403 4420 404a32 4399->4420 4400->4398 4406 4049d8 SendMessageW 4400->4406 4401->4400 4402 40491a 4417 404a0e 4402->4417 4414 4045e6 EnableWindow 4403->4414 4406->4398 4409 40482d GetDlgItem 4415 4045f9 SendMessageW 4409->4415 4411 404843 SendMessageW 4412 404860 GetSysColor 4411->4412 4413 404869 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4411->4413 4412->4413 4413->4398 4414->4409 4415->4411 4416->4402 4418 404a21 SendMessageW 4417->4418 4419 404a1c 4417->4419 4418->4385 4419->4418 4423 405c8e ShellExecuteExW 4420->4423 4422 404998 LoadCursorW SetCursor 4422->4391 4423->4422 4424 402383 4425 40238a 4424->4425 4428 40239d 4424->4428 4426 4066a5 17 API calls 4425->4426 4427 402397 4426->4427 4429 405cc8 MessageBoxIndirectW 4427->4429 4429->4428 4430 402c05 SendMessageW 4431 402c2a 4430->4431 4432 402c1f InvalidateRect 4430->4432 4432->4431 3790 401389 3792 401390 3790->3792 3791 4013fe 3792->3791 3793 4013cb MulDiv SendMessageW 3792->3793 3793->3792 4433 405809 4434 4059b3 4433->4434 4435 40582a GetDlgItem GetDlgItem GetDlgItem 4433->4435 4437 4059e4 4434->4437 4438 4059bc GetDlgItem CreateThread CloseHandle 4434->4438 4478 4045f9 SendMessageW 4435->4478 4440 405a0f 4437->4440 4441 405a34 4437->4441 4442 4059fb ShowWindow ShowWindow 4437->4442 4438->4437 4439 40589a 4444 4058a1 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4439->4444 4443 405a6f 4440->4443 4446 405a23 4440->4446 4447 405a49 ShowWindow 4440->4447 4448 40462b 8 API calls 4441->4448 4480 4045f9 SendMessageW 4442->4480 4443->4441 4453 405a7d SendMessageW 4443->4453 4451 4058f3 SendMessageW SendMessageW 4444->4451 4452 40590f 4444->4452 4454 40459d SendMessageW 4446->4454 4449 405a69 4447->4449 4450 405a5b 4447->4450 4459 405a42 4448->4459 4456 40459d SendMessageW 4449->4456 4455 4056ca 24 API calls 4450->4455 4451->4452 4457 405922 4452->4457 4458 405914 SendMessageW 4452->4458 4453->4459 4460 405a96 CreatePopupMenu 4453->4460 4454->4441 4455->4449 4456->4443 4462 4045c4 18 API calls 4457->4462 4458->4457 4461 4066a5 17 API calls 4460->4461 4463 405aa6 AppendMenuW 4461->4463 4464 405932 4462->4464 4465 405ac3 GetWindowRect 4463->4465 4466 405ad6 TrackPopupMenu 4463->4466 4467 40593b ShowWindow 4464->4467 4468 40596f GetDlgItem SendMessageW 4464->4468 4465->4466 4466->4459 4470 405af1 4466->4470 4471 405951 ShowWindow 4467->4471 4472 40595e 4467->4472 4468->4459 4469 405996 SendMessageW SendMessageW 4468->4469 4469->4459 4473 405b0d SendMessageW 4470->4473 4471->4472 4479 4045f9 SendMessageW 4472->4479 4473->4473 4474 405b2a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4473->4474 4476 405b4f SendMessageW 4474->4476 4476->4476 4477 405b78 GlobalUnlock SetClipboardData CloseClipboard 4476->4477 4477->4459 4478->4439 4479->4468 4480->4440 3794 40248a 3795 402da6 17 API calls 3794->3795 3796 40249c 3795->3796 3797 402da6 17 API calls 3796->3797 3798 4024a6 3797->3798 3811 402e36 3798->3811 3801 40292e 3802 4024de 3804 4024ea 3802->3804 3815 402d84 3802->3815 3803 402da6 17 API calls 3805 4024d4 lstrlenW 3803->3805 3807 402509 RegSetValueExW 3804->3807 3808 403371 44 API calls 3804->3808 3805->3802 3809 40251f RegCloseKey 3807->3809 3808->3807 3809->3801 3812 402e51 3811->3812 3818 406503 3812->3818 3816 4066a5 17 API calls 3815->3816 3817 402d99 3816->3817 3817->3804 3819 406512 3818->3819 3820 4024b6 3819->3820 3821 40651d RegCreateKeyExW 3819->3821 3820->3801 3820->3802 3820->3803 3821->3820 4481 404e0b 4482 404e37 4481->4482 4483 404e1b 4481->4483 4485 404e6a 4482->4485 4486 404e3d SHGetPathFromIDListW 4482->4486 4492 405cac GetDlgItemTextW 4483->4492 4487 404e54 SendMessageW 4486->4487 4488 404e4d 4486->4488 4487->4485 4490 40140b 2 API calls 4488->4490 4489 404e28 SendMessageW 4489->4482 4490->4487 4492->4489 4493 40290b 4494 402da6 17 API calls 4493->4494 4495 402912 FindFirstFileW 4494->4495 4496 40293a 4495->4496 4500 402925 4495->4500 4501 4065af wsprintfW 4496->4501 4498 402943 4502 406668 lstrcpynW 4498->4502 4501->4498 4502->4500 4503 40190c 4504 401943 4503->4504 4505 402da6 17 API calls 4504->4505 4506 401948 4505->4506 4507 405d74 67 API calls 4506->4507 4508 401951 4507->4508 4509 40190f 4510 402da6 17 API calls 4509->4510 4511 401916 4510->4511 4512 405cc8 MessageBoxIndirectW 4511->4512 4513 40191f 4512->4513 4514 401491 4515 4056ca 24 API calls 4514->4515 4516 401498 4515->4516 4517 402891 4518 402898 4517->4518 4519 402ba9 4517->4519 4520 402d84 17 API calls 4518->4520 4521 40289f 4520->4521 4522 4028ae SetFilePointer 4521->4522 4522->4519 4523 4028be 4522->4523 4525 4065af wsprintfW 4523->4525 4525->4519 4526 401f12 4527 402da6 17 API calls 4526->4527 4528 401f18 4527->4528 4529 402da6 17 API calls 4528->4529 4530 401f21 4529->4530 4531 402da6 17 API calls 4530->4531 4532 401f2a 4531->4532 4533 402da6 17 API calls 4532->4533 4534 401f33 4533->4534 4535 401423 24 API calls 4534->4535 4536 401f3a 4535->4536 4543 405c8e ShellExecuteExW 4536->4543 4538 401f82 4539 406ae0 5 API calls 4538->4539 4541 40292e 4538->4541 4540 401f9f CloseHandle 4539->4540 4540->4541 4543->4538 4544 402f93 4545 402fa5 SetTimer 4544->4545 4546 402fbe 4544->4546 4545->4546 4547 40300c 4546->4547 4548 403012 MulDiv 4546->4548 4549 402fcc wsprintfW SetWindowTextW SetDlgItemTextW 4548->4549 4549->4547 4565 401d17 4566 402d84 17 API calls 4565->4566 4567 401d1d IsWindow 4566->4567 4568 401a20 4567->4568 3952 401b9b 3953 401ba8 3952->3953 3954 401bec 3952->3954 3961 401bbf 3953->3961 3963 401c31 3953->3963 3955 401bf1 3954->3955 3956 401c16 GlobalAlloc 3954->3956 3960 40239d 3955->3960 3971 406668 lstrcpynW 3955->3971 3958 4066a5 17 API calls 3956->3958 3957 4066a5 17 API calls 3959 402397 3957->3959 3958->3963 3967 405cc8 MessageBoxIndirectW 3959->3967 3972 406668 lstrcpynW 3961->3972 3963->3957 3963->3960 3965 401c03 GlobalFree 3965->3960 3966 401bce 3973 406668 lstrcpynW 3966->3973 3967->3960 3969 401bdd 3974 406668 lstrcpynW 3969->3974 3971->3965 3972->3966 3973->3969 3974->3960 4569 40261c 4570 402da6 17 API calls 4569->4570 4571 402623 4570->4571 4574 406158 GetFileAttributesW CreateFileW 4571->4574 4573 40262f 4574->4573 3981 40259e 3982 402de6 17 API calls 3981->3982 3983 4025a8 3982->3983 3984 402d84 17 API calls 3983->3984 3985 4025b1 3984->3985 3986 40292e 3985->3986 3987 4025d9 RegEnumValueW 3985->3987 3988 4025cd RegEnumKeyW 3985->3988 3989 4025ee 3987->3989 3990 4025f5 RegCloseKey 3987->3990 3988->3990 3989->3990 3990->3986 4582 40149e 4583 4014ac PostQuitMessage 4582->4583 4584 40239d 4582->4584 4583->4584 4585 4015a3 4586 402da6 17 API calls 4585->4586 4587 4015aa SetFileAttributesW 4586->4587 4588 4015bc 4587->4588 3756 401fa4 3757 402da6 17 API calls 3756->3757 3758 401faa 3757->3758 3759 4056ca 24 API calls 3758->3759 3760 401fb4 3759->3760 3761 405c4b 2 API calls 3760->3761 3762 401fba 3761->3762 3763 401fdd CloseHandle 3762->3763 3767 40292e 3762->3767 3771 406ae0 WaitForSingleObject 3762->3771 3763->3767 3766 401fcf 3768 401fd4 3766->3768 3769 401fdf 3766->3769 3776 4065af wsprintfW 3768->3776 3769->3763 3772 406afa 3771->3772 3773 406b0c GetExitCodeProcess 3772->3773 3774 406a71 2 API calls 3772->3774 3773->3766 3775 406b01 WaitForSingleObject 3774->3775 3775->3772 3776->3763 3777 403c25 3778 403c40 3777->3778 3779 403c36 CloseHandle 3777->3779 3780 403c54 3778->3780 3781 403c4a CloseHandle 3778->3781 3779->3778 3786 403c82 3780->3786 3781->3780 3784 405d74 67 API calls 3785 403c65 3784->3785 3787 403c90 3786->3787 3788 403c59 3787->3788 3789 403c95 FreeLibrary GlobalFree 3787->3789 3788->3784 3789->3788 3789->3789 3822 40252a 3833 402de6 3822->3833 3825 402da6 17 API calls 3826 40253d 3825->3826 3827 402548 RegQueryValueExW 3826->3827 3831 40292e 3826->3831 3828 40256e RegCloseKey 3827->3828 3829 402568 3827->3829 3828->3831 3829->3828 3838 4065af wsprintfW 3829->3838 3834 402da6 17 API calls 3833->3834 3835 402dfd 3834->3835 3836 4064d5 RegOpenKeyExW 3835->3836 3837 402534 3836->3837 3837->3825 3838->3828 3839 4021aa 3840 402da6 17 API calls 3839->3840 3841 4021b1 3840->3841 3842 402da6 17 API calls 3841->3842 3843 4021bb 3842->3843 3844 402da6 17 API calls 3843->3844 3845 4021c5 3844->3845 3846 402da6 17 API calls 3845->3846 3847 4021cf 3846->3847 3848 402da6 17 API calls 3847->3848 3849 4021d9 3848->3849 3850 402218 CoCreateInstance 3849->3850 3851 402da6 17 API calls 3849->3851 3854 402237 3850->3854 3851->3850 3852 401423 24 API calls 3853 4022f6 3852->3853 3854->3852 3854->3853 4589 40202a 4590 402da6 17 API calls 4589->4590 4591 402031 4590->4591 4592 406a35 5 API calls 4591->4592 4593 402040 4592->4593 4594 4020cc 4593->4594 4595 40205c GlobalAlloc 4593->4595 4595->4594 4596 402070 4595->4596 4597 406a35 5 API calls 4596->4597 4598 402077 4597->4598 4599 406a35 5 API calls 4598->4599 4600 402081 4599->4600 4600->4594 4604 4065af wsprintfW 4600->4604 4602 4020ba 4605 4065af wsprintfW 4602->4605 4604->4602 4605->4594 4613 401a30 4614 402da6 17 API calls 4613->4614 4615 401a39 ExpandEnvironmentStringsW 4614->4615 4616 401a60 4615->4616 4617 401a4d 4615->4617 4617->4616 4618 401a52 lstrcmpW 4617->4618 4618->4616 4619 405031 GetDlgItem GetDlgItem 4620 405083 7 API calls 4619->4620 4621 4052a8 4619->4621 4622 40512a DeleteObject 4620->4622 4623 40511d SendMessageW 4620->4623 4626 40538a 4621->4626 4653 405317 4621->4653 4673 404f7f SendMessageW 4621->4673 4624 405133 4622->4624 4623->4622 4625 40516a 4624->4625 4629 4066a5 17 API calls 4624->4629 4627 4045c4 18 API calls 4625->4627 4628 405436 4626->4628 4632 40529b 4626->4632 4638 4053e3 SendMessageW 4626->4638 4631 40517e 4627->4631 4633 405440 SendMessageW 4628->4633 4634 405448 4628->4634 4630 40514c SendMessageW SendMessageW 4629->4630 4630->4624 4637 4045c4 18 API calls 4631->4637 4635 40462b 8 API calls 4632->4635 4633->4634 4641 405461 4634->4641 4642 40545a ImageList_Destroy 4634->4642 4649 405471 4634->4649 4640 405637 4635->4640 4654 40518f 4637->4654 4638->4632 4644 4053f8 SendMessageW 4638->4644 4639 40537c SendMessageW 4639->4626 4645 40546a GlobalFree 4641->4645 4641->4649 4642->4641 4643 4055eb 4643->4632 4650 4055fd ShowWindow GetDlgItem ShowWindow 4643->4650 4647 40540b 4644->4647 4645->4649 4646 40526a GetWindowLongW SetWindowLongW 4648 405283 4646->4648 4658 40541c SendMessageW 4647->4658 4651 4052a0 4648->4651 4652 405288 ShowWindow 4648->4652 4649->4643 4666 4054ac 4649->4666 4678 404fff 4649->4678 4650->4632 4672 4045f9 SendMessageW 4651->4672 4671 4045f9 SendMessageW 4652->4671 4653->4626 4653->4639 4654->4646 4657 4051e2 SendMessageW 4654->4657 4659 405265 4654->4659 4660 405220 SendMessageW 4654->4660 4661 405234 SendMessageW 4654->4661 4657->4654 4658->4628 4659->4646 4659->4648 4660->4654 4661->4654 4663 4055b6 4664 4055c1 InvalidateRect 4663->4664 4667 4055cd 4663->4667 4664->4667 4665 4054da SendMessageW 4669 4054f0 4665->4669 4666->4665 4666->4669 4667->4643 4687 404f3a 4667->4687 4668 405564 SendMessageW SendMessageW 4668->4669 4669->4663 4669->4668 4671->4632 4672->4621 4674 404fa2 GetMessagePos ScreenToClient SendMessageW 4673->4674 4675 404fde SendMessageW 4673->4675 4676 404fd6 4674->4676 4677 404fdb 4674->4677 4675->4676 4676->4653 4677->4675 4690 406668 lstrcpynW 4678->4690 4680 405012 4691 4065af wsprintfW 4680->4691 4682 40501c 4683 40140b 2 API calls 4682->4683 4684 405025 4683->4684 4692 406668 lstrcpynW 4684->4692 4686 40502c 4686->4666 4693 404e71 4687->4693 4689 404f4f 4689->4643 4690->4680 4691->4682 4692->4686 4694 404e8a 4693->4694 4695 4066a5 17 API calls 4694->4695 4696 404eee 4695->4696 4697 4066a5 17 API calls 4696->4697 4698 404ef9 4697->4698 4699 4066a5 17 API calls 4698->4699 4700 404f0f lstrlenW wsprintfW SetDlgItemTextW 4699->4700 4700->4689 4706 4023b2 4707 4023ba 4706->4707 4710 4023c0 4706->4710 4708 402da6 17 API calls 4707->4708 4708->4710 4709 4023ce 4712 4023dc 4709->4712 4713 402da6 17 API calls 4709->4713 4710->4709 4711 402da6 17 API calls 4710->4711 4711->4709 4714 402da6 17 API calls 4712->4714 4713->4712 4715 4023e5 WritePrivateProfileStringW 4714->4715 4716 404734 lstrlenW 4717 404753 4716->4717 4718 404755 WideCharToMultiByte 4716->4718 4717->4718 4719 402434 4720 402467 4719->4720 4721 40243c 4719->4721 4723 402da6 17 API calls 4720->4723 4722 402de6 17 API calls 4721->4722 4724 402443 4722->4724 4725 40246e 4723->4725 4727 402da6 17 API calls 4724->4727 4729 40247b 4724->4729 4730 402e64 4725->4730 4728 402454 RegDeleteValueW RegCloseKey 4727->4728 4728->4729 4731 402e78 4730->4731 4733 402e71 4730->4733 4731->4733 4734 402ea9 4731->4734 4733->4729 4735 4064d5 RegOpenKeyExW 4734->4735 4736 402ed7 4735->4736 4737 402ee7 RegEnumValueW 4736->4737 4744 402f81 4736->4744 4746 402f0a 4736->4746 4738 402f71 RegCloseKey 4737->4738 4737->4746 4738->4744 4739 402f46 RegEnumKeyW 4740 402f4f RegCloseKey 4739->4740 4739->4746 4741 406a35 5 API calls 4740->4741 4742 402f5f 4741->4742 4742->4744 4745 402f63 RegDeleteKeyW 4742->4745 4743 402ea9 6 API calls 4743->4746 4744->4733 4745->4744 4746->4738 4746->4739 4746->4740 4746->4743 4747 401735 4748 402da6 17 API calls 4747->4748 4749 40173c SearchPathW 4748->4749 4750 401757 4749->4750 4751 404ab5 4752 404ae1 4751->4752 4753 404af2 4751->4753 4812 405cac GetDlgItemTextW 4752->4812 4755 404afe GetDlgItem 4753->4755 4760 404b5d 4753->4760 4758 404b12 4755->4758 4756 404c41 4761 404df0 4756->4761 4814 405cac GetDlgItemTextW 4756->4814 4757 404aec 4759 4068ef 5 API calls 4757->4759 4763 404b26 SetWindowTextW 4758->4763 4764 405fe2 4 API calls 4758->4764 4759->4753 4760->4756 4760->4761 4765 4066a5 17 API calls 4760->4765 4768 40462b 8 API calls 4761->4768 4767 4045c4 18 API calls 4763->4767 4769 404b1c 4764->4769 4770 404bd1 SHBrowseForFolderW 4765->4770 4766 404c71 4771 40603f 18 API calls 4766->4771 4772 404b42 4767->4772 4773 404e04 4768->4773 4769->4763 4777 405f37 3 API calls 4769->4777 4770->4756 4774 404be9 CoTaskMemFree 4770->4774 4775 404c77 4771->4775 4776 4045c4 18 API calls 4772->4776 4778 405f37 3 API calls 4774->4778 4815 406668 lstrcpynW 4775->4815 4779 404b50 4776->4779 4777->4763 4780 404bf6 4778->4780 4813 4045f9 SendMessageW 4779->4813 4783 404c2d SetDlgItemTextW 4780->4783 4788 4066a5 17 API calls 4780->4788 4783->4756 4784 404b56 4786 406a35 5 API calls 4784->4786 4785 404c8e 4787 406a35 5 API calls 4785->4787 4786->4760 4794 404c95 4787->4794 4789 404c15 lstrcmpiW 4788->4789 4789->4783 4792 404c26 lstrcatW 4789->4792 4790 404cd6 4816 406668 lstrcpynW 4790->4816 4792->4783 4793 404cdd 4795 405fe2 4 API calls 4793->4795 4794->4790 4798 405f83 2 API calls 4794->4798 4800 404d2e 4794->4800 4796 404ce3 GetDiskFreeSpaceW 4795->4796 4799 404d07 MulDiv 4796->4799 4796->4800 4798->4794 4799->4800 4802 404f3a 20 API calls 4800->4802 4810 404d9f 4800->4810 4801 404dc2 4817 4045e6 EnableWindow 4801->4817 4804 404d8c 4802->4804 4803 40140b 2 API calls 4803->4801 4806 404da1 SetDlgItemTextW 4804->4806 4807 404d91 4804->4807 4806->4810 4808 404e71 20 API calls 4807->4808 4808->4810 4809 404dde 4809->4761 4811 404a0e SendMessageW 4809->4811 4810->4801 4810->4803 4811->4761 4812->4757 4813->4784 4814->4766 4815->4785 4816->4793 4817->4809 4818 401d38 4819 402d84 17 API calls 4818->4819 4820 401d3f 4819->4820 4821 402d84 17 API calls 4820->4821 4822 401d4b GetDlgItem 4821->4822 4823 402638 4822->4823 4824 4014b8 4825 4014be 4824->4825 4826 401389 2 API calls 4825->4826 4827 4014c6 4826->4827 4828 40563e 4829 405662 4828->4829 4830 40564e 4828->4830 4833 40566a IsWindowVisible 4829->4833 4839 405681 4829->4839 4831 405654 4830->4831 4832 4056ab 4830->4832 4835 404610 SendMessageW 4831->4835 4834 4056b0 CallWindowProcW 4832->4834 4833->4832 4836 405677 4833->4836 4837 40565e 4834->4837 4835->4837 4838 404f7f 5 API calls 4836->4838 4838->4839 4839->4834 4840 404fff 4 API calls 4839->4840 4840->4832 4841 40263e 4842 402652 4841->4842 4843 40266d 4841->4843 4844 402d84 17 API calls 4842->4844 4845 402672 4843->4845 4846 40269d 4843->4846 4855 402659 4844->4855 4848 402da6 17 API calls 4845->4848 4847 402da6 17 API calls 4846->4847 4850 4026a4 lstrlenW 4847->4850 4849 402679 4848->4849 4858 40668a WideCharToMultiByte 4849->4858 4850->4855 4852 40268d lstrlenA 4852->4855 4853 4026e7 4854 4026d1 4854->4853 4856 40620a WriteFile 4854->4856 4855->4853 4855->4854 4857 406239 5 API calls 4855->4857 4856->4853 4857->4854 4858->4852

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 0 403640-403690 SetErrorMode GetVersionExW 1 403692-4036c6 GetVersionExW 0->1 2 4036ca-4036d1 0->2 1->2 3 4036d3 2->3 4 4036db-40371b 2->4 3->4 5 40371d-403725 call 406a35 4->5 6 40372e 4->6 5->6 11 403727 5->11 8 403733-403747 call 4069c5 lstrlenA 6->8 13 403749-403765 call 406a35 * 3 8->13 11->6 20 403776-4037d8 #17 OleInitialize SHGetFileInfoW call 406668 GetCommandLineW call 406668 13->20 21 403767-40376d 13->21 28 4037e1-4037f4 call 405f64 CharNextW 20->28 29 4037da-4037dc 20->29 21->20 25 40376f 21->25 25->20 32 4038eb-4038f1 28->32 29->28 33 4038f7 32->33 34 4037f9-4037ff 32->34 37 40390b-403925 GetTempPathW call 40360f 33->37 35 403801-403806 34->35 36 403808-40380e 34->36 35->35 35->36 38 403810-403814 36->38 39 403815-403819 36->39 47 403927-403945 GetWindowsDirectoryW lstrcatW call 40360f 37->47 48 40397d-403995 DeleteFileW call 4030d0 37->48 38->39 41 4038d9-4038e7 call 405f64 39->41 42 40381f-403825 39->42 41->32 58 4038e9-4038ea 41->58 45 403827-40382e 42->45 46 40383f-403878 42->46 51 403830-403833 45->51 52 403835 45->52 53 403894-4038ce 46->53 54 40387a-40387f 46->54 47->48 62 403947-403977 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40360f 47->62 64 40399b-4039a1 48->64 65 403b6c-403b7a ExitProcess CoUninitialize 48->65 51->46 51->52 52->46 56 4038d0-4038d4 53->56 57 4038d6-4038d8 53->57 54->53 60 403881-403889 54->60 56->57 63 4038f9-403906 call 406668 56->63 57->41 58->32 66 403890 60->66 67 40388b-40388e 60->67 62->48 62->65 63->37 69 4039a7-4039ba call 405f64 64->69 70 403a48-403a4f call 403d17 64->70 72 403b91-403b97 65->72 73 403b7c-403b8b call 405cc8 ExitProcess 65->73 66->53 67->53 67->66 88 403a0c-403a19 69->88 89 4039bc-4039f1 69->89 83 403a54-403a57 70->83 74 403b99-403bae GetCurrentProcess OpenProcessToken 72->74 75 403c0f-403c17 72->75 80 403bb0-403bd9 LookupPrivilegeValueW AdjustTokenPrivileges 74->80 81 403bdf-403bed call 406a35 74->81 84 403c19 75->84 85 403c1c-403c1f ExitProcess 75->85 80->81 95 403bfb-403c06 ExitWindowsEx 81->95 96 403bef-403bf9 81->96 83->65 84->85 90 403a1b-403a29 call 40603f 88->90 91 403a5c-403a70 call 405c33 lstrcatW 88->91 93 4039f3-4039f7 89->93 90->65 104 403a2f-403a45 call 406668 * 2 90->104 107 403a72-403a78 lstrcatW 91->107 108 403a7d-403a97 lstrcatW lstrcmpiW 91->108 98 403a00-403a08 93->98 99 4039f9-4039fe 93->99 95->75 101 403c08-403c0a call 40140b 95->101 96->95 96->101 98->93 103 403a0a 98->103 99->98 99->103 101->75 103->88 104->70 107->108 109 403b6a 108->109 110 403a9d-403aa0 108->110 109->65 112 403aa2-403aa7 call 405b99 110->112 113 403aa9 call 405c16 110->113 119 403aae-403abe SetCurrentDirectoryW 112->119 113->119 121 403ac0-403ac6 call 406668 119->121 122 403acb-403af7 call 406668 119->122 121->122 126 403afc-403b17 call 4066a5 DeleteFileW 122->126 129 403b57-403b61 126->129 130 403b19-403b29 CopyFileW 126->130 129->126 132 403b63-403b65 call 406428 129->132 130->129 131 403b2b-403b4b call 406428 call 4066a5 call 405c4b 130->131 131->129 140 403b4d-403b54 CloseHandle 131->140 132->109 140->129
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00008001), ref: 00403663
                                                                                                                                                                                                                                                      • GetVersionExW.KERNEL32(?), ref: 0040368C
                                                                                                                                                                                                                                                      • GetVersionExW.KERNEL32(0000011C), ref: 004036A3
                                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040373A
                                                                                                                                                                                                                                                      • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403776
                                                                                                                                                                                                                                                      • OleInitialize.OLE32(00000000), ref: 0040377D
                                                                                                                                                                                                                                                      • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 0040379B
                                                                                                                                                                                                                                                      • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 004037B0
                                                                                                                                                                                                                                                      • CharNextW.USER32(00000000,"C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force,00000020,"C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force,00000000), ref: 004037E9
                                                                                                                                                                                                                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 0040391C
                                                                                                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040392D
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403939
                                                                                                                                                                                                                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040394D
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403955
                                                                                                                                                                                                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403966
                                                                                                                                                                                                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040396E
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(1033), ref: 00403982
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force,00000000,?), ref: 00403A69
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force,00000000,?), ref: 00403A78
                                                                                                                                                                                                                                                        • Part of subcall function 00405C16: CreateDirectoryW.KERNEL32(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force,00000000,?), ref: 00403A83
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force,00000000,?), ref: 00403A8F
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403AAF
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(00420F08,00420F08,?,6081953,?), ref: 00403B0E
                                                                                                                                                                                                                                                      • CopyFileW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,00420F08,00000001), ref: 00403B21
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 00403B4E
                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32(?), ref: 00403B6C
                                                                                                                                                                                                                                                      • CoUninitialize.COMBASE(?), ref: 00403B71
                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00403B8B
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403B9F
                                                                                                                                                                                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403BA6
                                                                                                                                                                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BBA
                                                                                                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403BD9
                                                                                                                                                                                                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403BFE
                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00403C1F
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                                                                                                                                                                                                      • String ID: "C:\Users\user\AppData\Local\Temp\nsy2C04.tmp" /internal 1730846226315208 /force$.tmp$1033$6081953$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsy2C04.tmp$C:\Users\user\PCAppStore$C:\Users\user\PCAppStore$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                                                                                                                                                                                      • API String ID: 2292928366-2515804137
                                                                                                                                                                                                                                                      • Opcode ID: 54eba713b65b488fe05b557adb658f0301d1077f312d6d7219dab3d109336353
                                                                                                                                                                                                                                                      • Instruction ID: d56582c8b11bee4b9d4e83ad1f604629a9588d533935b381636b20c84fba3529
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 54eba713b65b488fe05b557adb658f0301d1077f312d6d7219dab3d109336353
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D4E1F471A00214AADB20AFB58D45A6E3EB8EB05709F50847FF945B32D1DB7C8A41CB6D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 346 405d74-405d9a call 40603f 349 405db3-405dba 346->349 350 405d9c-405dae DeleteFileW 346->350 352 405dbc-405dbe 349->352 353 405dcd-405ddd call 406668 349->353 351 405f30-405f34 350->351 354 405dc4-405dc7 352->354 355 405ede-405ee3 352->355 361 405dec-405ded call 405f83 353->361 362 405ddf-405dea lstrcatW 353->362 354->353 354->355 355->351 357 405ee5-405ee8 355->357 359 405ef2-405efa call 40699e 357->359 360 405eea-405ef0 357->360 359->351 370 405efc-405f10 call 405f37 call 405d2c 359->370 360->351 365 405df2-405df6 361->365 362->365 366 405e02-405e08 lstrcatW 365->366 367 405df8-405e00 365->367 369 405e0d-405e29 lstrlenW FindFirstFileW 366->369 367->366 367->369 371 405ed3-405ed7 369->371 372 405e2f-405e37 369->372 386 405f12-405f15 370->386 387 405f28-405f2b call 4056ca 370->387 371->355 377 405ed9 371->377 374 405e57-405e6b call 406668 372->374 375 405e39-405e41 372->375 388 405e82-405e8d call 405d2c 374->388 389 405e6d-405e75 374->389 378 405e43-405e4b 375->378 379 405eb6-405ec6 FindNextFileW 375->379 377->355 378->374 382 405e4d-405e55 378->382 379->372 385 405ecc-405ecd FindClose 379->385 382->374 382->379 385->371 386->360 392 405f17-405f26 call 4056ca call 406428 386->392 387->351 397 405eae-405eb1 call 4056ca 388->397 398 405e8f-405e92 388->398 389->379 393 405e77-405e80 call 405d74 389->393 392->351 393->379 397->379 401 405e94-405ea4 call 4056ca call 406428 398->401 402 405ea6-405eac 398->402 401->379 402->379
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,76113420,76112EE0,00000000), ref: 00405D9D
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa5834.tmp\*.*,\*.*,C:\Users\user\AppData\Local\Temp\nsa5834.tmp\*.*,?,?,76113420,76112EE0,00000000), ref: 00405DE5
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsa5834.tmp\*.*,?,?,76113420,76112EE0,00000000), ref: 00405E08
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsa5834.tmp\*.*,?,?,76113420,76112EE0,00000000), ref: 00405E0E
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa5834.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsa5834.tmp\*.*,?,?,76113420,76112EE0,00000000), ref: 00405E1E
                                                                                                                                                                                                                                                      • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EBE
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00405ECD
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                                                                                                      • String ID: .$.$C:\Users\user\AppData\Local\Temp\nsa5834.tmp\*.*$\*.*
                                                                                                                                                                                                                                                      • API String ID: 2035342205-1843984256
                                                                                                                                                                                                                                                      • Opcode ID: eb4081a649fdbb44c8907daec76b44e1c805ca5b036c6d0867ef95af4715127c
                                                                                                                                                                                                                                                      • Instruction ID: 3801e3340fbbb9c460ab277ab089a7ece50ce31247a5b640c745bca9484d7288
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eb4081a649fdbb44c8907daec76b44e1c805ca5b036c6d0867ef95af4715127c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 46410330800A15AADB21AB61CC49BBF7678EF41715F50413FF881711D1DB7C4A82CEAE

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 566 406d5f-406d64 567 406dd5-406df3 566->567 568 406d66-406d95 566->568 569 4073cb-4073e0 567->569 570 406d97-406d9a 568->570 571 406d9c-406da0 568->571 572 4073e2-4073f8 569->572 573 4073fa-407410 569->573 574 406dac-406daf 570->574 575 406da2-406da6 571->575 576 406da8 571->576 577 407413-40741a 572->577 573->577 578 406db1-406dba 574->578 579 406dcd-406dd0 574->579 575->574 576->574 583 407441-40744d 577->583 584 40741c-407420 577->584 580 406dbc 578->580 581 406dbf-406dcb 578->581 582 406fa2-406fc0 579->582 580->581 585 406e35-406e63 581->585 589 406fc2-406fd6 582->589 590 406fd8-406fea 582->590 592 406be3-406bec 583->592 586 407426-40743e 584->586 587 4075cf-4075d9 584->587 593 406e65-406e7d 585->593 594 406e7f-406e99 585->594 586->583 591 4075e5-4075f8 587->591 595 406fed-406ff7 589->595 590->595 599 4075fd-407601 591->599 596 406bf2 592->596 597 4075fa 592->597 598 406e9c-406ea6 593->598 594->598 600 406ff9 595->600 601 406f9a-406fa0 595->601 603 406bf9-406bfd 596->603 604 406d39-406d5a 596->604 605 406c9e-406ca2 596->605 606 406d0e-406d12 596->606 597->599 608 406eac 598->608 609 406e1d-406e23 598->609 617 407581-40758b 600->617 618 406f7f-406f97 600->618 601->582 607 406f3e-406f48 601->607 603->591 610 406c03-406c10 603->610 604->569 619 406ca8-406cc1 605->619 620 40754e-407558 605->620 611 406d18-406d2c 606->611 612 40755d-407567 606->612 613 40758d-407597 607->613 614 406f4e-407117 607->614 625 406e02-406e1a 608->625 626 407569-407573 608->626 615 406ed6-406edc 609->615 616 406e29-406e2f 609->616 610->597 624 406c16-406c5c 610->624 627 406d2f-406d37 611->627 612->591 613->591 614->592 622 406f3a 615->622 623 406ede-406efc 615->623 616->585 616->622 617->591 618->601 629 406cc4-406cc8 619->629 620->591 622->607 630 406f14-406f26 623->630 631 406efe-406f12 623->631 632 406c84-406c86 624->632 633 406c5e-406c62 624->633 625->609 626->591 627->604 627->606 629->605 634 406cca-406cd0 629->634 637 406f29-406f33 630->637 631->637 640 406c94-406c9c 632->640 641 406c88-406c92 632->641 638 406c64-406c67 GlobalFree 633->638 639 406c6d-406c7b GlobalAlloc 633->639 635 406cd2-406cd9 634->635 636 406cfa-406d0c 634->636 642 406ce4-406cf4 GlobalAlloc 635->642 643 406cdb-406cde GlobalFree 635->643 636->627 637->615 644 406f35 637->644 638->639 639->597 645 406c81 639->645 640->629 641->640 641->641 642->597 642->636 643->642 647 407575-40757f 644->647 648 406ebb-406ed3 644->648 645->632 647->591 648->615
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                                                                                                                                                                                                      • Instruction ID: 02c1e40b0c9780dd067322b7733c474732bd0f187a49f53fd7fd3c108ee94619
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7CF15570D04229CBDF28CFA8C8946ADBBB0FF44305F24816ED456BB281D7386A86DF45
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(76113420,00426798,00425F50,00406088,00425F50,00425F50,00000000,00425F50,00425F50,76113420,?,76112EE0,00405D94,?,76113420,76112EE0), ref: 004069A9
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 004069B5
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2295610775-0
                                                                                                                                                                                                                                                      • Opcode ID: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                                                                                                                                                                                                                                      • Instruction ID: 0ca7534fdffec89160a31ceabb6ef5ff718bfc83d1618d69d17f9e635378cbc3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5ED012B15192205FC34057387E0C84B7A989F563317268A36B4AAF11E0CB348C3297AC

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 141 403d17-403d2f call 406a35 144 403d31-403d41 call 4065af 141->144 145 403d43-403d7a call 406536 141->145 154 403d9d-403dc6 call 403fed call 40603f 144->154 150 403d92-403d98 lstrcatW 145->150 151 403d7c-403d8d call 406536 145->151 150->154 151->150 159 403e58-403e60 call 40603f 154->159 160 403dcc-403dd1 154->160 166 403e62-403e69 call 4066a5 159->166 167 403e6e-403e93 LoadImageW 159->167 160->159 162 403dd7-403dff call 406536 160->162 162->159 168 403e01-403e05 162->168 166->167 170 403f14-403f1c call 40140b 167->170 171 403e95-403ec5 RegisterClassW 167->171 172 403e17-403e23 lstrlenW 168->172 173 403e07-403e14 call 405f64 168->173 184 403f26-403f31 call 403fed 170->184 185 403f1e-403f21 170->185 174 403fe3 171->174 175 403ecb-403f0f SystemParametersInfoW CreateWindowExW 171->175 179 403e25-403e33 lstrcmpiW 172->179 180 403e4b-403e53 call 405f37 call 406668 172->180 173->172 178 403fe5-403fec 174->178 175->170 179->180 183 403e35-403e3f GetFileAttributesW 179->183 180->159 187 403e41-403e43 183->187 188 403e45-403e46 call 405f83 183->188 194 403f37-403f51 ShowWindow call 4069c5 184->194 195 403fba-403fc2 call 40579d 184->195 185->178 187->180 187->188 188->180 200 403f53-403f58 call 4069c5 194->200 201 403f5d-403f6f GetClassInfoW 194->201 202 403fc4-403fca 195->202 203 403fdc-403fde call 40140b 195->203 200->201 206 403f71-403f81 GetClassInfoW RegisterClassW 201->206 207 403f87-403fb8 DialogBoxParamW call 40140b call 403c67 201->207 202->185 208 403fd0-403fd7 call 40140b 202->208 203->174 206->207 207->178 208->185
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00406A35: GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                                                                                                                                                                                                                        • Part of subcall function 00406A35: GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,76113420,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403D98
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(get,?,?,?,get,00000000,C:\Users\user\PCAppStore,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,76113420), ref: 00403E18
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,.exe,get,?,?,?,get,00000000,C:\Users\user\PCAppStore,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403E2B
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(get,?,00000000,?), ref: 00403E36
                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\PCAppStore), ref: 00403E7F
                                                                                                                                                                                                                                                        • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                                                                                                                                                                                                                                                      • RegisterClassW.USER32(00429200), ref: 00403EBC
                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ED4
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F09
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403F3F
                                                                                                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403F6B
                                                                                                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403F78
                                                                                                                                                                                                                                                      • RegisterClassW.USER32(00429200), ref: 00403F81
                                                                                                                                                                                                                                                      • DialogBoxParamW.USER32(?,00000000,004040C5,00000000), ref: 00403FA0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                                                                      • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\PCAppStore$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$get
                                                                                                                                                                                                                                                      • API String ID: 1975747703-689544761
                                                                                                                                                                                                                                                      • Opcode ID: 78a63079156de9a95659751e2075cee6996798d0e51b0c114acce594fd97feca
                                                                                                                                                                                                                                                      • Instruction ID: e235badc60aeba35c86cf297cd954ec43a22164425911800af60bc979c7621a1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 78a63079156de9a95659751e2075cee6996798d0e51b0c114acce594fd97feca
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E661D570640201BAD730AF66AD45E2B3A7CEB84B49F40457FF945B22E1DB3D5911CA3D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 215 4030d0-40311e GetTickCount GetModuleFileNameW call 406158 218 403120-403125 215->218 219 40312a-403158 call 406668 call 405f83 call 406668 GetFileSize 215->219 220 40336a-40336e 218->220 227 403243-403251 call 40302e 219->227 228 40315e 219->228 234 403322-403327 227->234 235 403257-40325a 227->235 230 403163-40317a 228->230 232 40317c 230->232 233 40317e-403187 call 4035e2 230->233 232->233 241 40318d-403194 233->241 242 4032de-4032e6 call 40302e 233->242 234->220 237 403286-4032d2 GlobalAlloc call 406b90 call 406187 CreateFileW 235->237 238 40325c-403274 call 4035f8 call 4035e2 235->238 266 4032d4-4032d9 237->266 267 4032e8-403318 call 4035f8 call 403371 237->267 238->234 261 40327a-403280 238->261 246 403210-403214 241->246 247 403196-4031aa call 406113 241->247 242->234 251 403216-40321d call 40302e 246->251 252 40321e-403224 246->252 247->252 264 4031ac-4031b3 247->264 251->252 257 403233-40323b 252->257 258 403226-403230 call 406b22 252->258 257->230 265 403241 257->265 258->257 261->234 261->237 264->252 270 4031b5-4031bc 264->270 265->227 266->220 276 40331d-403320 267->276 270->252 272 4031be-4031c5 270->272 272->252 273 4031c7-4031ce 272->273 273->252 275 4031d0-4031f0 273->275 275->234 277 4031f6-4031fa 275->277 276->234 278 403329-40333a 276->278 279 403202-40320a 277->279 280 4031fc-403200 277->280 281 403342-403347 278->281 282 40333c 278->282 279->252 283 40320c-40320e 279->283 280->265 280->279 284 403348-40334e 281->284 282->281 283->252 284->284 285 403350-403368 call 406113 284->285 285->220
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 004030E4
                                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,00000400), ref: 00403100
                                                                                                                                                                                                                                                        • Part of subcall function 00406158: GetFileAttributesW.KERNEL32(00000003,00403113,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,80000000,00000003), ref: 0040615C
                                                                                                                                                                                                                                                        • Part of subcall function 00406158: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,80000000,00000003), ref: 00403149
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 0040328B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsy2C04.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                                                                                                                      • API String ID: 2803837635-1621536749
                                                                                                                                                                                                                                                      • Opcode ID: dff409350d06ce17b221650d583fb97333c6afb1e6ebf9b4c6eec62bfd946937
                                                                                                                                                                                                                                                      • Instruction ID: 6a7077609e6cbe8902eef3654a796be60faa9129f620d49927b75729aeb44cd1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dff409350d06ce17b221650d583fb97333c6afb1e6ebf9b4c6eec62bfd946937
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 74710271A40204ABDB20DFB5DD85B9E3AACAB04315F21457FF901B72D2CB789E418B6D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 288 4066a5-4066b0 289 4066b2-4066c1 288->289 290 4066c3-4066d9 288->290 289->290 291 4066f1-4066fa 290->291 292 4066db-4066e8 290->292 294 406700 291->294 295 4068d5-4068e0 291->295 292->291 293 4066ea-4066ed 292->293 293->291 296 406705-406712 294->296 297 4068e2-4068e6 call 406668 295->297 298 4068eb-4068ec 295->298 296->295 299 406718-406721 296->299 297->298 301 4068b3 299->301 302 406727-406764 299->302 303 4068c1-4068c4 301->303 304 4068b5-4068bf 301->304 305 406857-40685c 302->305 306 40676a-406771 302->306 307 4068c6-4068cf 303->307 304->307 308 40685e-406864 305->308 309 40688f-406894 305->309 310 406773-406775 306->310 311 406776-406778 306->311 307->295 312 406702 307->312 313 406874-406880 call 406668 308->313 314 406866-406872 call 4065af 308->314 317 4068a3-4068b1 lstrlenW 309->317 318 406896-40689e call 4066a5 309->318 310->311 315 4067b5-4067b8 311->315 316 40677a-4067a1 call 406536 311->316 312->296 329 406885-40688b 313->329 314->329 319 4067c8-4067cb 315->319 320 4067ba-4067c6 GetSystemDirectoryW 315->320 333 40683e-406842 316->333 335 4067a7-4067b0 call 4066a5 316->335 317->307 318->317 326 406834-406836 319->326 327 4067cd-4067db GetWindowsDirectoryW 319->327 325 406838-40683c 320->325 325->333 334 40684f-406855 call 4068ef 325->334 326->325 332 4067dd-4067e5 326->332 327->326 329->317 331 40688d 329->331 331->334 339 4067e7-4067f0 332->339 340 4067fc-406812 SHGetSpecialFolderLocation 332->340 333->334 336 406844-40684a lstrcatW 333->336 334->317 335->325 336->334 345 4067f8-4067fa 339->345 343 406830 340->343 344 406814-40682e SHGetPathFromIDListW CoTaskMemFree 340->344 343->326 344->325 344->343 345->325 345->340
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(get,00000400), ref: 004067C0
                                                                                                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(get,00000400,00000000,00422728,?,00405701,00422728,00000000,00000000,00000000,00000000), ref: 004067D3
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(get,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Directory$SystemWindowslstrcatlstrlen
                                                                                                                                                                                                                                                      • String ID: 6081953$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$get
                                                                                                                                                                                                                                                      • API String ID: 4260037668-232701268
                                                                                                                                                                                                                                                      • Opcode ID: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                                                                                                                                                                                                                                      • Instruction ID: 414c90a3e727c3679fd522760d05a71ccfd37451a898d0680c6fb4b4ce958948
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CD61E172A02115EBDB20AF64CD40BAA37A5EF10314F22C13EE946B62D0DB3D49A1CB5D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 410 40176f-401794 call 402da6 call 405fae 415 401796-40179c call 406668 410->415 416 40179e-4017b0 call 406668 call 405f37 lstrcatW 410->416 421 4017b5-4017b6 call 4068ef 415->421 416->421 425 4017bb-4017bf 421->425 426 4017c1-4017cb call 40699e 425->426 427 4017f2-4017f5 425->427 434 4017dd-4017ef 426->434 435 4017cd-4017db CompareFileTime 426->435 428 4017f7-4017f8 call 406133 427->428 429 4017fd-401819 call 406158 427->429 428->429 437 40181b-40181e 429->437 438 40188d-4018b6 call 4056ca call 403371 429->438 434->427 435->434 439 401820-40185e call 406668 * 2 call 4066a5 call 406668 call 405cc8 437->439 440 40186f-401879 call 4056ca 437->440 450 4018b8-4018bc 438->450 451 4018be-4018ca SetFileTime 438->451 439->425 472 401864-401865 439->472 452 401882-401888 440->452 450->451 454 4018d0-4018db CloseHandle 450->454 451->454 455 402c33 452->455 457 4018e1-4018e4 454->457 458 402c2a-402c2d 454->458 459 402c35-402c39 455->459 462 4018e6-4018f7 call 4066a5 lstrcatW 457->462 463 4018f9-4018fc call 4066a5 457->463 458->455 469 401901-4023a2 call 405cc8 462->469 463->469 469->458 469->459 472->452 474 401867-401868 472->474 474->440
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(00000000,00000000,get,C:\Users\user\PCAppStore,?,?,00000031), ref: 004017B0
                                                                                                                                                                                                                                                      • CompareFileTime.KERNEL32(-00000014,?,get,get,00000000,00000000,get,C:\Users\user\PCAppStore,?,?,00000031), ref: 004017D5
                                                                                                                                                                                                                                                        • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsa5834.tmp$C:\Users\user\AppData\Local\Temp\nsa5834.tmp\inetc.dll$C:\Users\user\PCAppStore$get
                                                                                                                                                                                                                                                      • API String ID: 1941528284-2187339701
                                                                                                                                                                                                                                                      • Opcode ID: 8a10f81b580edd96727de623d2cb72512ccae63576be40aac63ba19ed1c47bc7
                                                                                                                                                                                                                                                      • Instruction ID: 87dd38174d63fc88252c3cacf76d35d2aef1a13c6195c1d88e2760da23471212
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8a10f81b580edd96727de623d2cb72512ccae63576be40aac63ba19ed1c47bc7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DE41B771500205BACF10BBB5CD85DAE7A75EF45328B20473FF422B21E1D63D89619A2E

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 476 4069c5-4069e5 GetSystemDirectoryW 477 4069e7 476->477 478 4069e9-4069eb 476->478 477->478 479 4069fc-4069fe 478->479 480 4069ed-4069f6 478->480 482 4069ff-406a32 wsprintfW LoadLibraryExW 479->482 480->479 481 4069f8-4069fa 480->481 481->482
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 00406A17
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                                                                                                                                      • String ID: %s%S.dll$UXTHEME$\
                                                                                                                                                                                                                                                      • API String ID: 2200240437-1946221925
                                                                                                                                                                                                                                                      • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                                                                                                                                                                                                      • Instruction ID: e2ac2e7087162e0187f8b4d6776822ec24d6e31928394cf94a41c199a4feb156
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3AF096B154121DA7DB14AB68DD0EF9B366CAB00705F11447EA646F20E0EB7CDA68CB98

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00402A06
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2667972263-0
                                                                                                                                                                                                                                                      • Opcode ID: 3dd095c025195d1a428b75d74b89fb792f772f3b0487a4c6f2200001eeea121b
                                                                                                                                                                                                                                                      • Instruction ID: 78b93316678d616cb595922dcd62a83f4062aa2fb33f08fb70827f98fa9650ab
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3dd095c025195d1a428b75d74b89fb792f772f3b0487a4c6f2200001eeea121b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E131B171D00124BBCF216FA9CE89D9EBE79AF09364F10023AF461762E1CB794D429B58

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 519 405b99-405be4 CreateDirectoryW 520 405be6-405be8 519->520 521 405bea-405bf7 GetLastError 519->521 522 405c11-405c13 520->522 521->522 523 405bf9-405c0d SetFileSecurityW 521->523 523->520 524 405c0f GetLastError 523->524 524->522
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00405BF0
                                                                                                                                                                                                                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405C05
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00405C0F
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BBF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                                      • API String ID: 3449924974-3355392842
                                                                                                                                                                                                                                                      • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                                                                                                                                                                                                      • Instruction ID: 886f74eda6482ab63e8fe18d08a652fea41827dc0a526659a7d7b5e138c44e4e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 95010871D04219EAEF009FA1CD44BEFBBB8EF14314F04403ADA44B6180E7789648CB99

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 525 40248a-4024bb call 402da6 * 2 call 402e36 532 4024c1-4024cb 525->532 533 402c2a-402c39 525->533 535 4024cd-4024da call 402da6 lstrlenW 532->535 536 4024de-4024e1 532->536 535->536 539 4024e3-4024f4 call 402d84 536->539 540 4024f5-4024f8 536->540 539->540 543 402509-40251d RegSetValueExW 540->543 544 4024fa-402504 call 403371 540->544 546 402522-402603 RegCloseKey 543->546 547 40251f 543->547 544->543 546->533 550 40292e-402935 546->550 547->546 550->533
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa5834.tmp,00000023,00000011,00000002), ref: 004024D5
                                                                                                                                                                                                                                                      • RegSetValueExW.KERNEL32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsa5834.tmp,00000000,00000011,00000002), ref: 00402515
                                                                                                                                                                                                                                                      • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsa5834.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseValuelstrlen
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsa5834.tmp
                                                                                                                                                                                                                                                      • API String ID: 2655323295-2973138001
                                                                                                                                                                                                                                                      • Opcode ID: 0c53a365a9c608e81ef79c85193ab9a3ad89e5c6fa2fbf23b50052b3995ee250
                                                                                                                                                                                                                                                      • Instruction ID: a516967871aadb8e7373f7254d3c24ec0cdbd982f2b4049ed7d94b0996b6da2b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0c53a365a9c608e81ef79c85193ab9a3ad89e5c6fa2fbf23b50052b3995ee250
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4011AF71E00108BEEF10AFA1CE49EAEB6B8EB44354F11443AF404B61C1DBB98D409658

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 551 406187-406193 552 406194-4061c8 GetTickCount GetTempFileNameW 551->552 553 4061d7-4061d9 552->553 554 4061ca-4061cc 552->554 556 4061d1-4061d4 553->556 554->552 555 4061ce 554->555 555->556
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 004061A5
                                                                                                                                                                                                                                                      • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,?,0040363E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 004061C0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CountFileNameTempTick
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                                                                                                                                                      • API String ID: 1716503409-944333549
                                                                                                                                                                                                                                                      • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                                                                                                                                                                                                      • Instruction ID: 21b676f9b33da427d45e0b2d6905a63b6509bf3d89a4e990effff8b21c6fdcbe
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C3F09076700214BFEB008F59DD05E9AB7BCEBA1710F11803AEE05EB180E6B0A9648768

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 557 403c25-403c34 558 403c40-403c48 557->558 559 403c36-403c39 CloseHandle 557->559 560 403c54-403c60 call 403c82 call 405d74 558->560 561 403c4a-403c4d CloseHandle 558->561 559->558 565 403c65-403c66 560->565 561->560
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C37
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C4B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\nsa5834.tmp\, xrefs: 00403C5B
                                                                                                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C2A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseHandle
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsa5834.tmp\
                                                                                                                                                                                                                                                      • API String ID: 2962429428-1099018199
                                                                                                                                                                                                                                                      • Opcode ID: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                                                                                                                                                                                                                                                      • Instruction ID: ab9e488bef71b432d29da19662b82269d7b8f1628316f3e3d8f7e3aa77a32ace
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3BE0863244471496E5246F7DAF4D9853B285F413357248726F178F60F0C7389A9B4A9D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 649 4015c1-4015d5 call 402da6 call 405fe2 654 401631-401634 649->654 655 4015d7-4015ea call 405f64 649->655 656 401663-4022f6 call 401423 654->656 657 401636-401655 call 401423 call 406668 SetCurrentDirectoryW 654->657 662 401604-401607 call 405c16 655->662 663 4015ec-4015ef 655->663 673 402c2a-402c39 656->673 674 40292e-402935 656->674 657->673 676 40165b-40165e 657->676 672 40160c-40160e 662->672 663->662 666 4015f1-4015f8 call 405c33 663->666 666->662 680 4015fa-4015fd call 405b99 666->680 678 401610-401615 672->678 679 401627-40162f 672->679 674->673 676->673 682 401624 678->682 683 401617-401622 GetFileAttributesW 678->683 679->654 679->655 685 401602 680->685 682->679 683->679 683->682 685->672
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,76113420,?,76112EE0,00405D94,?,76113420,76112EE0,00000000), ref: 00405FF0
                                                                                                                                                                                                                                                        • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                                                                                                                                                                                                                        • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                                                                                                                                                                                                        • Part of subcall function 00405B99: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\PCAppStore,?,00000000,000000F0), ref: 0040164D
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\PCAppStore, xrefs: 00401640
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\PCAppStore
                                                                                                                                                                                                                                                      • API String ID: 1892508949-3527889612
                                                                                                                                                                                                                                                      • Opcode ID: ff9909915b16c23767ee925164981e8f632181fd0fe0b495a8c7e415af322c96
                                                                                                                                                                                                                                                      • Instruction ID: a0118e7b9b939ef3ea3e51add98df8039a5aa70d3b8e99a19be4f9c31e9f39fe
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ff9909915b16c23767ee925164981e8f632181fd0fe0b495a8c7e415af322c96
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 04112231508105EBCF30AFA0CD4099E36A0EF15329B28493BF901B22F1DB3E4982DB5E

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 686 40603f-40605a call 406668 call 405fe2 691 406060-40606d call 4068ef 686->691 692 40605c-40605e 686->692 696 40607d-406081 691->696 697 40606f-406075 691->697 693 4060b8-4060ba 692->693 699 406097-4060a0 lstrlenW 696->699 697->692 698 406077-40607b 697->698 698->692 698->696 700 4060a2-4060b6 call 405f37 GetFileAttributesW 699->700 701 406083-40608a call 40699e 699->701 700->693 706 406091-406092 call 405f83 701->706 707 40608c-40608f 701->707 706->699 707->692 707->706
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                                                                                                                                                                                                        • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,76113420,?,76112EE0,00405D94,?,76113420,76112EE0,00000000), ref: 00405FF0
                                                                                                                                                                                                                                                        • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                                                                                                                                                                                                                        • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50,76113420,?,76112EE0,00405D94,?,76113420,76112EE0,00000000), ref: 00406098
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50,76113420,?,76112EE0,00405D94,?,76113420,76112EE0), ref: 004060A8
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                                                                                                                                      • String ID: P_B
                                                                                                                                                                                                                                                      • API String ID: 3248276644-906794629
                                                                                                                                                                                                                                                      • Opcode ID: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                                                                                                                                                                                                      • Instruction ID: df110f430b83b9381375b5fd3fa67f6c4419d4890c6468873e0fced3c2676832
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0DF07826144A1216E622B23A0C05BAF05098F82354B07063FFC93B22E1DF3C8973C43E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                                                                                                                                                                                                      • Instruction ID: 10cc2cc0f2c892254e5285b7a8bac4c216a70fda8fb68dfa7c3680dd08f727d3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 55A15571E04228DBDF28CFA8C8547ADBBB1FF44305F10842AD856BB281D778A986DF45
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                                                                                                                                                                                                      • Instruction ID: d49815ad38d406b3cd0a1a90ea7be1526168d9e39684835ffa6a026ef1ef4849
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 91913270D04228DBEF28CF98C8547ADBBB1FF44305F14816AD856BB281D778A986DF45
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                                                                                                                                                                                                      • Instruction ID: 0a676f48c9952aad729ccf503b6a86ce95496029d8c73069f89f3073be052f6e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C3813471D08228DFDF24CFA8C8847ADBBB1FB44305F24816AD456BB281D778A986DF05
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                                                                                                                                                                                                      • Instruction ID: 41bbaa2e3590000dceee7c9791d291245bc26db239967492cd44d063337b5de0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3E814831D08228DBEF28CFA8C8447ADBBB1FF44305F14816AD856B7281D778A986DF45
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                                                                                                                                                                                                      • Instruction ID: 4a3513360c1d1cc4287bdabe5afcaa460628bed3c0d7ae87261646ca99be8a9f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0D711271D04228DBEF28CF98C9947ADBBF1FB44305F14806AD856B7280D738A986DF05
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                                                                                                                                                                                                      • Instruction ID: aecab3f40db1f9fc07a3dc9ea3777efa7aa3d7dc23f88bc09ddd959c6243594a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2B711571D04228DBEF28CF98C8547ADBBB1FF44305F14806AD856BB281D778A986DF05
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                                                                                                                                                                                                      • Instruction ID: 947ff9f4813c08031b822263453b6bbc7859602ae013fffc9a74d3363ad91bbb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FE713471E04228DBEF28CF98C8547ADBBB1FF44305F15806AD856BB281C778A986DF45
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 0040348D
                                                                                                                                                                                                                                                        • Part of subcall function 004035F8: SetFilePointer.KERNEL32(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 004034C0
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(12F86091,00000000,00000000,00414EF0,00004000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000), ref: 004035BB
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FilePointer$CountTick
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1092082344-0
                                                                                                                                                                                                                                                      • Opcode ID: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                                                                                                                                                                                                                                      • Instruction ID: 4a0f782daef8a724a5dada35133bb9654e3c612a62d69fcdf17392b9264be50a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3A31AEB2650205EFC7209F29EE848263BADF70475A755023BE900B22F1C7B59D42DB9D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00402103
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 334405425-0
                                                                                                                                                                                                                                                      • Opcode ID: 52f8d756bd50154f6a3dea7293860066d65bf9effb7e174b318ab9c425843f66
                                                                                                                                                                                                                                                      • Instruction ID: 1e7e134340f86907485d462c64894228b35b3344cd4f3d252167f9901203d809
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 52f8d756bd50154f6a3dea7293860066d65bf9effb7e174b318ab9c425843f66
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C521C231904104FADF11AFA5CF48A9D7A70BF48354F60413BF605B91E0DBBD8A929A5D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(03A54198), ref: 00401C0B
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000804), ref: 00401C1D
                                                                                                                                                                                                                                                        • Part of subcall function 004066A5: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                                                                                                                                                                        • Part of subcall function 004066A5: lstrlenW.KERNEL32(get,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Global$AllocFreelstrcatlstrlen
                                                                                                                                                                                                                                                      • String ID: get
                                                                                                                                                                                                                                                      • API String ID: 3292104215-4248514160
                                                                                                                                                                                                                                                      • Opcode ID: 4319b31a17754bffce461f57a5489b402a00cd847fb6eeae40cdae925115eaf0
                                                                                                                                                                                                                                                      • Instruction ID: d74cddccbdd50a14e5bf5e3e63826a63b2a65df0fd836753f00777670cd3b466
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4319b31a17754bffce461f57a5489b402a00cd847fb6eeae40cdae925115eaf0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5321D872904210DBDB20EFA4DEC4E5E73A4AB047157150A3BF542F72D0D6BD9C518BAD
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D1
                                                                                                                                                                                                                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E4
                                                                                                                                                                                                                                                      • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsa5834.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Enum$CloseValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 397863658-0
                                                                                                                                                                                                                                                      • Opcode ID: a2874957321bf6034ab335a01143add9f6f6121a8284cc98450072ad0413cc1f
                                                                                                                                                                                                                                                      • Instruction ID: fdd171a53236be04b49e80cc8c25aaf428e2db1c32e81cf7e645575326a8d696
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a2874957321bf6034ab335a01143add9f6f6121a8284cc98450072ad0413cc1f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 35017CB1A04105ABEB159F94DE58AAEB66CEF40348F10403AF501B61D0EBB85E45966D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00406133: GetFileAttributesW.KERNEL32(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                                                                                                                                                                                                                                                        • Part of subcall function 00406133: SetFileAttributesW.KERNEL32(?,00000000), ref: 0040614C
                                                                                                                                                                                                                                                      • RemoveDirectoryW.KERNEL32(?,?,?,00000000,00405F0E), ref: 00405D47
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,00405F0E), ref: 00405D4F
                                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D67
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$Attributes$DeleteDirectoryRemove
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1655745494-0
                                                                                                                                                                                                                                                      • Opcode ID: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
                                                                                                                                                                                                                                                      • Instruction ID: f7500ddcb6900c42920b0fa7cdf939b3a50fd8fb6693fff67202f671924a8b23
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6DE0E531218A9156C3207734AD0CB5B2A98EF86314F09893FF5A2B11E0D77885078AAD
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\PCAppStore, xrefs: 00402269
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateInstance
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\PCAppStore
                                                                                                                                                                                                                                                      • API String ID: 542301482-3527889612
                                                                                                                                                                                                                                                      • Opcode ID: 4e8b9e8d9efc1323b126c51a2f9450484e7b2217165b473e9f4f1a567a0bf10e
                                                                                                                                                                                                                                                      • Instruction ID: f110e38d5ccd8909b9e85e2ea6b1342c5fae2602ce40754bea02e3b472428d32
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4e8b9e8d9efc1323b126c51a2f9450484e7b2217165b473e9f4f1a567a0bf10e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BC411771A00209EFCF40DFE4C989E9D7BB5BF49304B20456AF505EB2D1DB799981CB94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegOpenKeyExW.KERNEL32(00000000,00000000,00000000,?,?,00422728,?,('B,00406563,('B,00000000,?,?,get,?), ref: 004064F9
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Open
                                                                                                                                                                                                                                                      • String ID: ('B
                                                                                                                                                                                                                                                      • API String ID: 71445658-2332581011
                                                                                                                                                                                                                                                      • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                                                                                                                                                                                      • Instruction ID: 5036765eb4ab6e58186d81024f5778724aa2024cd81e2e1d5ca813995cf5404a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BAD0123210020DBBDF115F90AD01FAB375DAB08310F018426FE06A4092D775D534A728
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 00403396
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FilePointer
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 973152223-0
                                                                                                                                                                                                                                                      • Opcode ID: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                                                                                                                                                                                                                                      • Instruction ID: 963a71f16df831595788c30304fa9cedbf2cad19eb63879c1ada4fe15c9ed8fa
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 93319F70200219EFDB129F65ED84E9A3FA8FF00355B10443AF905EA1A1D778CE51DBA9
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                                                                                                                                                                                                                                                      • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsa5834.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseQueryValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3356406503-0
                                                                                                                                                                                                                                                      • Opcode ID: 2f519eafec3af35988992028302c1fe2ffbfb85c9afca13b7af9384ace0fec36
                                                                                                                                                                                                                                                      • Instruction ID: eaee0c709954dca67eb2d1c59e66f6ca2c08a593dad46a4828cc6951ae7b5872
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2f519eafec3af35988992028302c1fe2ffbfb85c9afca13b7af9384ace0fec36
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5C116D71900219EBDF14DFA4DE589AE7774FF04345B20443BE401B62D0E7B88A45EB5D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                                      • Opcode ID: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                                                                                                                                                                                                                                      • Instruction ID: af17251ef12b8b272b5eaf8d1bef107274ce64b6e67bb2dd4604cf2723900e86
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6F012831724220EBEB295B389D05B6A3698E710714F10857FF855F76F1E678CC029B6D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,00000000,00000000), ref: 00405C74
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00405C81
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3712363035-0
                                                                                                                                                                                                                                                      • Opcode ID: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                                                                                                                                                                                                                                                      • Instruction ID: 91309136e62a13352d93043ad9bb7922807806bb2ea2f765c8e9c4a894a003d9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 59E0B6B4600209BFFB109B64EE09F7B7BADFB04648F414565BD51F2190D778A8158A78
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                                                                                                                                                                                                                        • Part of subcall function 004069C5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                                                                                                                                                                                                                        • Part of subcall function 004069C5: wsprintfW.USER32 ref: 00406A17
                                                                                                                                                                                                                                                        • Part of subcall function 004069C5: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2547128583-0
                                                                                                                                                                                                                                                      • Opcode ID: a89557e88259ac32882439a66efe2bded2b7fe37332f597cb2162f61758b0433
                                                                                                                                                                                                                                                      • Instruction ID: 0464b4a7853edb7079d0776797c383171681067eb8499b99987f1e8ea9f8efb8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a89557e88259ac32882439a66efe2bded2b7fe37332f597cb2162f61758b0433
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E0E086727042106AD210A6745D08D3773E8ABC6711307883EF557F2040D738DC359A79
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,76113420,00000000,76112EE0,00403C59,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C9C
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00403CA3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Free$GlobalLibrary
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1100898210-0
                                                                                                                                                                                                                                                      • Opcode ID: e868f33ba05eeb96666b2da3448a48ed76ae7177416a2bb01e196352cb617163
                                                                                                                                                                                                                                                      • Instruction ID: 1b4b668df254a36c82b8f96f79c5ae0e05fb6c29bd97d86a5de4613e9375b038
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e868f33ba05eeb96666b2da3448a48ed76ae7177416a2bb01e196352cb617163
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0AE08C335052205BD6211F55EA0875A7768AF94B26F06006AE980BB26087781C424BC8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(00000003,00403113,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,80000000,00000003), ref: 0040615C
                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$AttributesCreate
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 415043291-0
                                                                                                                                                                                                                                                      • Opcode ID: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                                                                                                                                                                                                                                      • Instruction ID: 0e1b57c135d9ed337dcee0f1630d7a3ffd6699826ab823f4ff8c6da5104765b0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DCD09E71254201AFEF0D8F20DF16F2E7AA2EB94B04F11952CB682940E1DAB15C15AB19
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 0040614C
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AttributesFile
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3188754299-0
                                                                                                                                                                                                                                                      • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                                                                                                                                                      • Instruction ID: 3e6336b5c460747e2e1e0fbe3c4db8defb42c0044e1a92967a1d29a512d2a4bc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 73D0C972514130ABC2102728AE0889ABB56EB64271B014A35F9A5A62B0CB304C628A98
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00405C2A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1375471231-0
                                                                                                                                                                                                                                                      • Opcode ID: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                                                                                                                                                                                                                                      • Instruction ID: 66e62c5d6c7775ff4cea72667941029308d228c48495a605f612c1d2d9e1fc74
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FBC04C31218605AEE7605B219F0CB177A94DB50741F114839E186F40A0DA788455D92D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegCreateKeyExW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 0040652C
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Create
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2289755597-0
                                                                                                                                                                                                                                                      • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                                                                                                                                                                                                      • Instruction ID: 390987c888b9fe28ccc3a202ccefe0e129b8fdbaba7b34d45eb5723cdb444700
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C1E0ECB2010109BEEF099F90EC0ADBB372DEB04704F41492EF907E4091E6B5AE70AA34
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • WriteFile.KERNEL32(?,00000000,00000000,00000000,00000000,00412A94,0040CEF0,00403579,0040CEF0,00412A94,00414EF0,00004000,?,00000000,004033A3,00000004), ref: 0040621E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileWrite
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3934441357-0
                                                                                                                                                                                                                                                      • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                                                                                                                                                      • Instruction ID: 398385dbb58ca0a44fa402a726e0ab0b2131cea3ae709c8a1b666252059dd88a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F6E08632141129EBCF10AE548C00EEB375CFB01350F014476F955E3040D330E93087A5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035F5,?,?,004034F9,00414EF0,00004000,?,00000000,004033A3), ref: 004061EF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileRead
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2738559852-0
                                                                                                                                                                                                                                                      • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                                                                                                                                                      • Instruction ID: 689b8facb1381159ac92aeccc4703b7db47ce2620db9a14c340ec3ef8a35c8b1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C1E0863250021AABDF10AE518C04AEB375CEB01360F014477F922E2150D230E82187E8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FilePointer
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 973152223-0
                                                                                                                                                                                                                                                      • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                                                                                                                                                      • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                                                                        • Part of subcall function 00405C4B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,00000000,00000000), ref: 00405C74
                                                                                                                                                                                                                                                        • Part of subcall function 00405C4B: CloseHandle.KERNEL32(?), ref: 00405C81
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                                                                                                                                                                                                        • Part of subcall function 00406AE0: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406AF1
                                                                                                                                                                                                                                                        • Part of subcall function 00406AE0: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B13
                                                                                                                                                                                                                                                        • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2972824698-0
                                                                                                                                                                                                                                                      • Opcode ID: 39558c5643c496eaffaca9d6483fe6d6b72d5b00fb47a50e88cd8089dc569f6d
                                                                                                                                                                                                                                                      • Instruction ID: 7fe263eab699b123ac8c37dffe14ee58438593542e676086741668bd6549bbba
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 39558c5643c496eaffaca9d6483fe6d6b72d5b00fb47a50e88cd8089dc569f6d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3DF09072905112EBDF21BBA59AC4DAE76A4DF01318B25453BE102B21E0D77C4E528A6E
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000403), ref: 00405867
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 00405876
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 004058B3
                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000002), ref: 004058BA
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 004058DB
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004058EC
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004058FF
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040590D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405920
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405942
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405956
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405977
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405987
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059A0
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059AC
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 00405885
                                                                                                                                                                                                                                                        • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004059C9
                                                                                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_0000579D,00000000), ref: 004059D7
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 004059DE
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 00405A02
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405A07
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000008), ref: 00405A51
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405A85
                                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 00405A96
                                                                                                                                                                                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AAA
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00405ACA
                                                                                                                                                                                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405AE3
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B1B
                                                                                                                                                                                                                                                      • OpenClipboard.USER32(00000000), ref: 00405B2B
                                                                                                                                                                                                                                                      • EmptyClipboard.USER32 ref: 00405B31
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B3D
                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00405B47
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B5B
                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405B7B
                                                                                                                                                                                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405B86
                                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00405B8C
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                                                                                                                                      • String ID: H7B${
                                                                                                                                                                                                                                                      • API String ID: 590372296-2256286769
                                                                                                                                                                                                                                                      • Opcode ID: 0185fb71cb0ebac8bb253ddb79263eb6e3c4c27c477fa06c1930d1494c9be16a
                                                                                                                                                                                                                                                      • Instruction ID: d0bbb34d81c2c7a38b5cdb5171fa906e4f4201ee6cbe22cb0b3272b57562556b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0185fb71cb0ebac8bb253ddb79263eb6e3c4c27c477fa06c1930d1494c9be16a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D8B137B0900608FFDF119FA0DD89AAE7B79FB08354F00417AFA45A61A0CB755E52DF68
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00405049
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000408), ref: 00405054
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 0040509E
                                                                                                                                                                                                                                                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050B5
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000FC,0040563E), ref: 004050CE
                                                                                                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004050E2
                                                                                                                                                                                                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004050F4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 0040510A
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405116
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405128
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 0040512B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405156
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405162
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 004051FD
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040522D
                                                                                                                                                                                                                                                        • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405241
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0040526F
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040527D
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000005), ref: 0040528D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405388
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004053ED
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405402
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405426
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405446
                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 0040545B
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 0040546B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004054E4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 0040558D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040559C
                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 004055C7
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 00405615
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 00405620
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 00405627
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                                                                                                      • String ID: $M$N
                                                                                                                                                                                                                                                      • API String ID: 2564846305-813528018
                                                                                                                                                                                                                                                      • Opcode ID: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                                                                                                                                                                                                                                      • Instruction ID: a1eb65f7683e17450fca8d4cb4c1055b074660be5b1b810df034ff690b7f681c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2A025CB0900609EFDF20DF65CD45AAE7BB5FB44315F10817AEA10BA2E1D7798A52CF18
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404101
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?), ref: 00404121
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404133
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000004), ref: 0040414C
                                                                                                                                                                                                                                                      • DestroyWindow.USER32 ref: 00404160
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404179
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,?), ref: 00404198
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041AC
                                                                                                                                                                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 004041B3
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 0040425E
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00404268
                                                                                                                                                                                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00404282
                                                                                                                                                                                                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004042D3
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000003), ref: 00404379
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?), ref: 0040439A
                                                                                                                                                                                                                                                      • EnableWindow.USER32(?,?), ref: 004043AC
                                                                                                                                                                                                                                                      • EnableWindow.USER32(?,?), ref: 004043C7
                                                                                                                                                                                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004043DD
                                                                                                                                                                                                                                                      • EnableMenuItem.USER32(00000000), ref: 004043E4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004043FC
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040440F
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(00423748,?,00423748,00000000), ref: 00404439
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,00423748), ref: 0040444D
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,0000000A), ref: 00404581
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                                                                                                                                                                      • String ID: H7B
                                                                                                                                                                                                                                                      • API String ID: 1860320154-2300413410
                                                                                                                                                                                                                                                      • Opcode ID: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                                                                                                                                                                                                                                      • Instruction ID: 1d4a55fced449df2e2a9dfc159c1061f424388fbea236c5341ec002980a30b6c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C0C1C2B1600604FBDB216F61EE85E2A3B78EB85745F40097EF781B51F0CB3958529B2E
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404821
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404835
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404852
                                                                                                                                                                                                                                                      • GetSysColor.USER32(?), ref: 00404863
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404871
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040487F
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00404884
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404891
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048A6
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 004048FF
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000), ref: 00404906
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404931
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404974
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00404982
                                                                                                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 00404985
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0040499E
                                                                                                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 004049A1
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 004049D0
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 004049E2
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                                                                                                                                                                      • String ID: N$get
                                                                                                                                                                                                                                                      • API String ID: 3103080414-214687294
                                                                                                                                                                                                                                                      • Opcode ID: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                                                                                                                                                                                                      • Instruction ID: 690b4d321b533a2a97605fa3f7bb2423a24794fe1ec6c961d913f822d5f12d1b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AB6181F1900209FFDB109F61CD85A6A7B69FB84304F00813AF705B62E0C7799951DFA9
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404B04
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00404B2E
                                                                                                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404BDF
                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404BEA
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(get,00423748,00000000,?,?), ref: 00404C1C
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(?,get), ref: 00404C28
                                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C3A
                                                                                                                                                                                                                                                        • Part of subcall function 00405CAC: GetDlgItemTextW.USER32(?,?,00000400,00404C71), ref: 00405CBF
                                                                                                                                                                                                                                                        • Part of subcall function 004068EF: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76113420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                                                                                                                                                                                                                                        • Part of subcall function 004068EF: CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                                                                                                                                                                                                                                        • Part of subcall function 004068EF: CharNextW.USER32(?,00000000,76113420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                                                                                                                                                                                                                                        • Part of subcall function 004068EF: CharPrevW.USER32(?,?,76113420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                                                                                                                                                                                                                                      • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 00404CFD
                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D18
                                                                                                                                                                                                                                                        • Part of subcall function 00404E71: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                                                                                                                                                                                                        • Part of subcall function 00404E71: wsprintfW.USER32 ref: 00404F1B
                                                                                                                                                                                                                                                        • Part of subcall function 00404E71: SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                                                                      • String ID: 6081953$A$C:\Users\user\PCAppStore$H7B$get
                                                                                                                                                                                                                                                      • API String ID: 2624150263-272213476
                                                                                                                                                                                                                                                      • Opcode ID: 667bbe0a30595837a03e9c6ce466c2f6c83f7bc5ead90454ae6c6de6e9a81711
                                                                                                                                                                                                                                                      • Instruction ID: 9155a42c54a3203d4d9709c494e168d8d926bd307d67cbb08bf4d9f42020e7e3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 667bbe0a30595837a03e9c6ce466c2f6c83f7bc5ead90454ae6c6de6e9a81711
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 94A171F1900219ABDB11EFA5CD41AAFB7B8EF84315F11843BF601B62D1D77C8A418B69
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406449,?,?), ref: 004062E9
                                                                                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 004062F2
                                                                                                                                                                                                                                                        • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                                                                                                                                                                                                        • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(?,004275E8,00000400), ref: 0040630F
                                                                                                                                                                                                                                                      • wsprintfA.USER32 ref: 0040632D
                                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?,?,?,?,?), ref: 00406368
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406377
                                                                                                                                                                                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063AF
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 00406405
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00406416
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040641D
                                                                                                                                                                                                                                                        • Part of subcall function 00406158: GetFileAttributesW.KERNEL32(00000003,00403113,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,80000000,00000003), ref: 0040615C
                                                                                                                                                                                                                                                        • Part of subcall function 00406158: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                                                                                                                                                                      • String ID: %ls=%ls$[Rename]$mB$uB$uB
                                                                                                                                                                                                                                                      • API String ID: 2171350718-2295842750
                                                                                                                                                                                                                                                      • Opcode ID: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                                                                                                                                                                                                                                      • Instruction ID: df9b4e9fb9d32bd4c250032a1d399944af7a2e4c2f0bdec2b7d3959d12e60cc8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B8314331200315BBD2206B619D49F5B3AACEF85704F16003BFD02FA2C2EA7DD82186BD
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                                                                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                                                                                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                                                                                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                                                                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                                                                                                                                      • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                                                                                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                                                                                                      • String ID: F
                                                                                                                                                                                                                                                      • API String ID: 941294808-1304234792
                                                                                                                                                                                                                                                      • Opcode ID: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                                                                                                                                                                                                      • Instruction ID: e2f9fea5dfd6f059ba8eeb08e8d10ac227d01a2162b8a260283931f50cd0bfbf
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 33418B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0C7349A55DFA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                                                                        • Part of subcall function 004066A5: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                                                                                                                                                                        • Part of subcall function 004066A5: lstrlenW.KERNEL32(get,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                                                                                                                                                                                                                      • String ID: ('B
                                                                                                                                                                                                                                                      • API String ID: 1495540970-2332581011
                                                                                                                                                                                                                                                      • Opcode ID: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                                                                                                                                                                                                                                      • Instruction ID: 7f52a71d89202be05388d2ae90ba5930d13dcc1e6093ad3ff4eaa481a322a782
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C6217A71900518FACB119FA5DD84A8EBFB8EB45360F10857AF904B62A0D67A4A509F68
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00404648
                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000000), ref: 00404686
                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00404692
                                                                                                                                                                                                                                                      • SetBkMode.GDI32(?,?), ref: 0040469E
                                                                                                                                                                                                                                                      • GetSysColor.USER32(?), ref: 004046B1
                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,?), ref: 004046C1
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 004046DB
                                                                                                                                                                                                                                                      • CreateBrushIndirect.GDI32(?), ref: 004046E5
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2320649405-0
                                                                                                                                                                                                                                                      • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                                                                                                                                                      • Instruction ID: e78b8cc9c8042372c9a7340b9b8aa9b23ded286a9f8ddc7240a2e2d8bd1f46c0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DE2197715007049FC7309F28D908B5BBBF8AF42714F008D2EE992A22E1D739D944DB58
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                                                                                                                                                                                                                        • Part of subcall function 00406239: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040624F
                                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                                                                                                                                      • String ID: 9
                                                                                                                                                                                                                                                      • API String ID: 163830602-2366072709
                                                                                                                                                                                                                                                      • Opcode ID: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                                                                                                                                                                                                                                      • Instruction ID: 581cf2785626502de532f206a1de9da9d9b8d20bcd24121b7f7bd1133decb9a2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CE51FB75D00219AADF20EF95CA88AAEBB75FF04304F50417BE541B62D4D7B49D82CB58
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76113420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                                                                                                                                                                                                                                      • CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                                                                                                                                                                                                                                      • CharNextW.USER32(?,00000000,76113420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                                                                                                                                                                                                                                      • CharPrevW.USER32(?,?,76113420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Char$Next$Prev
                                                                                                                                                                                                                                                      • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                                      • API String ID: 589700163-2977677972
                                                                                                                                                                                                                                                      • Opcode ID: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                                                                                                                                                                                                      • Instruction ID: d28fb8c2eefe6f61a155ceb01790bbf8b21f4710aa7989e54d8eeb8481a577c9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2611089580061295DB303B18CC40BB762F8AF99B50F12403FE98A776C1E77C4C9286BD
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000), ref: 00403049
                                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00403067
                                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 00403095
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                                                                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 004030B9
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 004030C7
                                                                                                                                                                                                                                                        • Part of subcall function 00403012: MulDiv.KERNEL32(00000000,00000064,00015C8B), ref: 00403027
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                                                                                                                                                      • String ID: ... %d%%
                                                                                                                                                                                                                                                      • API String ID: 722711167-2449383134
                                                                                                                                                                                                                                                      • Opcode ID: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                                                                                                                                                                                                                                                      • Instruction ID: 5af6bf9b0b70cf9307c1258d0e5a667b07be53d22b58a3258066d7aee54b172b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E8018E70553614DBC7317F60AE08A5A3EACAB00F06F54457AF841B21E9DAB84645CBAE
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404F9A
                                                                                                                                                                                                                                                      • GetMessagePos.USER32 ref: 00404FA2
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00404FBC
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404FCE
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404FF4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message$Send$ClientScreen
                                                                                                                                                                                                                                                      • String ID: f
                                                                                                                                                                                                                                                      • API String ID: 41195575-1993550816
                                                                                                                                                                                                                                                      • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                                                                                                                                                      • Instruction ID: ce4c7d6d39dceca23aa6ebdb29af7737867007859e7bede0b388bd4d525dd41f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3C014C71940219BADB00DBA4DD85BFEBBB8AF54711F10012BBB50B61C0D6B49A058BA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 00402FE5
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00402FF5
                                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403007
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                                                                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                                                                                                                                                      • API String ID: 1451636040-1158693248
                                                                                                                                                                                                                                                      • Opcode ID: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                                                                                                                                                                                                      • Instruction ID: 34ad84b97f90b05cf42cbebec4ee1aaae98efe268bf46a139428006d78f28757
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 25F0497050020DABEF246F60DD49BEA3B69FB00309F00803AFA05B51D0DFBD9A559F59
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 00404F1B
                                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                                                                                                      • String ID: %u.%u%s%s$H7B
                                                                                                                                                                                                                                                      • API String ID: 3540041739-107966168
                                                                                                                                                                                                                                                      • Opcode ID: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                                                                                                                                                                                                                                      • Instruction ID: 20619224473e8c08b4fba53027c62ddcf1c3fef784a2ba69f514aa474de30786
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1A11D8736041283BDB00A5ADDC45E9F3298AB81338F150637FA26F61D1EA79882182E8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                                                                                                                                                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                                                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseEnum$DeleteValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1354259210-0
                                                                                                                                                                                                                                                      • Opcode ID: 953796069c20d6fa7490a0bfa1861ca0c616837e62ffc418281f2642f3cef6d6
                                                                                                                                                                                                                                                      • Instruction ID: 37c7ba0f9c491dd7f389852fcb35a119484072d927876f68e32cbd91f0a54eef
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 953796069c20d6fa7490a0bfa1861ca0c616837e62ffc418281f2642f3cef6d6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6D216B7150010ABBDF11AF94CE89EEF7B7DEB50384F110076F909B21E0D7B49E54AA68
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                                                                                                                                                                                                      • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1849352358-0
                                                                                                                                                                                                                                                      • Opcode ID: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                                                                                                                                                                                                      • Instruction ID: 4d725fdcf847a80329c23b38d7164c003567f542edd6fcacfb34c9ebeef40da9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 67212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389951DB98
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDC.USER32(?), ref: 00401E51
                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                                                                                                                                                                                                        • Part of subcall function 004066A5: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                                                                                                                                                                        • Part of subcall function 004066A5: lstrlenW.KERNEL32(get,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                                                                                                                                                                                                      • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2584051700-0
                                                                                                                                                                                                                                                      • Opcode ID: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                                                                                                                                                                                                                                      • Instruction ID: b9cc094806d22c325402cb6ccb5f5134c2025175c414775df3ff87de861ccae2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8401B571900241EFEB005BB4EE89A9A3FB0AB15301F208939F541B71D2C6B904459BED
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Timeout
                                                                                                                                                                                                                                                      • String ID: !
                                                                                                                                                                                                                                                      • API String ID: 1777923405-2657877971
                                                                                                                                                                                                                                                      • Opcode ID: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                                                                                                                                                                                                      • Instruction ID: e1c20d37316975b9b94706f7b3abd8da4b7b3b5136eece5bd2aa3cbae88a6c19
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 28219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,0040A230,00000000,('B,00000000,?,?,get,?,?,0040679D,80000002), ref: 0040657C
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,0040679D,80000002,Software\Microsoft\Windows\CurrentVersion,get,get,get,00000000,00422728), ref: 00406587
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseQueryValue
                                                                                                                                                                                                                                                      • String ID: ('B$get
                                                                                                                                                                                                                                                      • API String ID: 3356406503-1955485993
                                                                                                                                                                                                                                                      • Opcode ID: abb8e2472c70d4d58aecb7d0dfcf889930bd109b5a1b9baac0574de2233c5019
                                                                                                                                                                                                                                                      • Instruction ID: 52dd0fe420a7c1e2827d1a164217834099ee72e945ce70567094b216899e5676
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: abb8e2472c70d4d58aecb7d0dfcf889930bd109b5a1b9baac0574de2233c5019
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C4017C72500209FADF21CF51DD09EDB3BA8EF54364F01803AFD1AA2190D738D964DBA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F3D
                                                                                                                                                                                                                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F47
                                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405F59
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F37
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                                      • API String ID: 2659869361-3355392842
                                                                                                                                                                                                                                                      • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                                                                                                                                                      • Instruction ID: 9007417a49851ea4d61da9c71e51c63d156abd36d345156a737e00ee84923012
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 59D05E611019246AC111AB548D04DDB63ACAE85304742046AF601B60A0CB7E196287ED
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa5834.tmp\inetc.dll), ref: 00402695
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: lstrlen
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsa5834.tmp$C:\Users\user\AppData\Local\Temp\nsa5834.tmp\inetc.dll
                                                                                                                                                                                                                                                      • API String ID: 1659193697-2352780313
                                                                                                                                                                                                                                                      • Opcode ID: 9a86cc41fb3ba1d07c106fca7ec167276fc7dee72b5d11bed2732143b2a4cd05
                                                                                                                                                                                                                                                      • Instruction ID: f1e3379d491753f9d96dc3c217618d2e64da59e9cc8309568291ba5d2d488428
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9a86cc41fb3ba1d07c106fca7ec167276fc7dee72b5d11bed2732143b2a4cd05
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D511C472A00205EBCB10BBB18E4AA9E76619F44758F21483FE402B61C1DAFD8891965F
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 0040566D
                                                                                                                                                                                                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 004056BE
                                                                                                                                                                                                                                                        • Part of subcall function 00404610: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3748168415-3916222277
                                                                                                                                                                                                                                                      • Opcode ID: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                                                                                                                                                                                                      • Instruction ID: 537e1cae7e4c88fb21f4f8cfd237bdd46b0b38e99f2a5e053ca6ba0093d9a5c8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4401B171200608AFEF205F11DD84A6B3A35EB84361F904837FA08752E0D77F8D929E6D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\AppData\Local\Temp,0040313C,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,80000000,00000003), ref: 00405F89
                                                                                                                                                                                                                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\AppData\Local\Temp,0040313C,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,C:\Users\user\AppData\Local\Temp\nsy2C04.tmp,80000000,00000003), ref: 00405F99
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp, xrefs: 00405F83
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CharPrevlstrlen
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp
                                                                                                                                                                                                                                                      • API String ID: 2709904686-670666241
                                                                                                                                                                                                                                                      • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                                                                                                                                                                                                      • Instruction ID: bd974b3f77e4b05eb9372a1ad14375fba7b947cfa10dd8d614d5bb7090e452f7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6CD05EB2401D219EC3126B04DC00D9F63ACEF51301B4A4866E441AB1A0DB7C5D9186A9
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                                                                                                                                                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060E5
                                                                                                                                                                                                                                                      • CharNextA.USER32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060F6
                                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000007.00000002.5205279645.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205207149.0000000000400000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205347624.0000000000408000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000425000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000427000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.000000000042B000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000430000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000433000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000435000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000454000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5205435016.0000000000457000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045D000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000007.00000002.5206051404.000000000045F000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_7_2_400000_nsy2C04.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 190613189-0
                                                                                                                                                                                                                                                      • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                                                                                                                                                                                                      • Instruction ID: 2f06b96f93541eceebcae48a9adfe7aedd37cb678349478f8cad11de2473fd3e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0BF0F631104054FFDB12DFA4CD00D9EBBA8EF06350B2640BAE841FB321D674DE11A798

                                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                                      Execution Coverage:16%
                                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                      Signature Coverage:2.2%
                                                                                                                                                                                                                                                      Total number of Nodes:2000
                                                                                                                                                                                                                                                      Total number of Limit Nodes:31
                                                                                                                                                                                                                                                      execution_graph 65689 7ff64b8b16d0 65847 7ff64b8b0450 65689->65847 65692 7ff64b8b0450 49 API calls 65693 7ff64b8b1742 65692->65693 65694 7ff64b8b0450 49 API calls 65693->65694 65695 7ff64b8b176c 65694->65695 65696 7ff64b8b0450 49 API calls 65695->65696 65697 7ff64b8b17a8 65696->65697 65850 7ff64b8b11a0 65697->65850 65699 7ff64b8b1942 65854 7ff64b8b05d0 65699->65854 65703 7ff64b8b199c 65867 7ff64b8e1780 65703->65867 65709 7ff64b8b19f7 65885 7ff64ba74db0 65709->65885 65711 7ff64b8b1a4a 65712 7ff64b8b11a0 51 API calls 65711->65712 65713 7ff64b8b1b83 65712->65713 65888 7ff64b8f98a0 65713->65888 66119 7ff64b8b0380 65847->66119 65849 7ff64b8b046d 65849->65692 65851 7ff64b8b11c7 65850->65851 66152 7ff64b8ab440 65851->66152 65853 7ff64b8b11ec 65853->65699 66195 7ff64b8ba5a0 65854->66195 65858 7ff64b8b05eb 65859 7ff64ba5e070 65858->65859 65860 7ff64ba5e0a5 65859->65860 65861 7ff64ba5e0db CoInitializeEx 65860->65861 65862 7ff64ba5e0f3 65861->65862 65866 7ff64ba5e0f1 65861->65866 66221 7ff64b919be0 CoCreateInstance 65862->66221 65864 7ff64ba5e11b 65864->65866 66222 7ff64ba5e460 65864->66222 65866->65703 65868 7ff64b8e17b3 65867->65868 65869 7ff64b8b0510 68 API calls 65868->65869 65870 7ff64b8e17c5 65869->65870 66489 7ff64b8e1a20 65870->66489 65873 7ff64b8b3680 RtlFreeHeap 65874 7ff64b8b19ca 65873->65874 65875 7ff64b94f5c0 65874->65875 66498 7ff64ba8af60 65875->66498 65877 7ff64b94f5d6 66503 7ff64b94f480 65877->66503 65880 7ff64b959690 66531 7ff64b8e5030 65880->66531 65883 7ff64b8e5030 49 API calls 65884 7ff64b9596b8 65883->65884 65884->65709 65886 7ff64b8b0450 49 API calls 65885->65886 65887 7ff64ba74ddc 65886->65887 65887->65711 65889 7ff64b8b11a0 51 API calls 65888->65889 65890 7ff64b8f98cd 65889->65890 66555 7ff64b8f8170 65890->66555 65895 7ff64b8f9e60 51 API calls 65896 7ff64b8f9914 65895->65896 66566 7ff64b8f8140 65896->66566 65899 7ff64b8b3c10 47 API calls 65900 7ff64b8f9943 65899->65900 66569 7ff64b8f89d0 65900->66569 65902 7ff64b8f997b 65903 7ff64b8f9a29 65902->65903 66591 7ff64b8f8200 47 API calls 65902->66591 66592 7ff64b8f9cd0 51 API calls 65902->66592 66582 7ff64b8b04b0 65903->66582 65907 7ff64b8b3be0 47 API calls 65909 7ff64b8f9a58 65907->65909 65910 7ff64b8b3c10 47 API calls 65909->65910 65911 7ff64b8f9a66 65910->65911 65912 7ff64b8b3c10 47 API calls 65911->65912 65913 7ff64b8f9a74 65912->65913 65914 7ff64b8b3c10 47 API calls 65913->65914 66120 7ff64b8b0398 66119->66120 66123 7ff64b8b8440 66120->66123 66122 7ff64b8b03a7 66122->65849 66125 7ff64b8b8468 66123->66125 66124 7ff64b8b848d 66124->66122 66125->66124 66127 7ff64b8b84e0 66125->66127 66129 7ff64b8bea20 RtlPcToFileHeader RaiseException 66125->66129 66130 7ff64b8d0d40 66127->66130 66129->66127 66131 7ff64b8d0d67 66130->66131 66136 7ff64b8d0d60 66130->66136 66132 7ff64b8d0d90 66131->66132 66137 7ff64b8d0daa 66131->66137 66146 7ff64bac90f0 11 API calls 66132->66146 66134 7ff64b8d0d95 66147 7ff64bac8f84 47 API calls 66134->66147 66136->66124 66137->66136 66138 7ff64b8d0dfd 66137->66138 66141 7ff64b8d0e14 66137->66141 66148 7ff64bac90f0 11 API calls 66138->66148 66140 7ff64b8d0e02 66149 7ff64bac8f84 47 API calls 66140->66149 66141->66136 66150 7ff64bac90f0 11 API calls 66141->66150 66144 7ff64b8d0e46 66151 7ff64bac8f84 47 API calls 66144->66151 66146->66134 66147->66136 66148->66140 66149->66136 66150->66144 66151->66136 66153 7ff64b8ab467 66152->66153 66155 7ff64b8ab473 66153->66155 66158 7ff64b8c2970 51 API calls 66153->66158 66157 7ff64b8ab4ac 66155->66157 66159 7ff64b8aaff0 66155->66159 66157->65853 66158->66155 66162 7ff64b8aaf60 66159->66162 66165 7ff64b8c2a10 66162->66165 66170 7ff64b8ad180 66165->66170 66171 7ff64b8ad1ae 66170->66171 66172 7ff64b8ad1b3 66170->66172 66181 7ff64b8c2260 RtlPcToFileHeader RaiseException 66171->66181 66174 7ff64b8aaef0 66172->66174 66175 7ff64b8aaf01 66174->66175 66176 7ff64b8aaf05 66174->66176 66175->66157 66177 7ff64b8aaf10 66176->66177 66178 7ff64b8aaf1c 66176->66178 66182 7ff64b8ab050 66177->66182 66190 7ff64b8beb90 66178->66190 66181->66172 66183 7ff64b8ab073 66182->66183 66184 7ff64b8ab078 66182->66184 66193 7ff64b8c2260 RtlPcToFileHeader RaiseException 66183->66193 66185 7ff64b8beb90 4 API calls 66184->66185 66188 7ff64b8ab083 66185->66188 66189 7ff64b8ab0a4 66188->66189 66194 7ff64bac8fa4 47 API calls 66188->66194 66189->66175 66191 7ff64bac2bd0 4 API calls 66190->66191 66192 7ff64b8beba3 66191->66192 66192->66175 66193->66184 66202 7ff64b8ba620 66195->66202 66198 7ff64b8b03d0 66199 7ff64b8b03de 66198->66199 66199->66199 66201 7ff64b8b041e 66199->66201 66220 7ff64b8b8370 RtlPcToFileHeader RaiseException 66199->66220 66201->65858 66203 7ff64b8ba649 66202->66203 66217 7ff64b8ba68b 66202->66217 66218 7ff64bac2efc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 66203->66218 66204 7ff64b8b05de 66204->66198 66217->66204 66219 7ff64bac2efc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 66217->66219 66220->66199 66221->65864 66223 7ff64b8b11a0 51 API calls 66222->66223 66224 7ff64ba5e49d 66223->66224 66225 7ff64b8f98a0 72 API calls 66224->66225 66226 7ff64ba5e4b7 66225->66226 66227 7ff64b8b11a0 51 API calls 66226->66227 66228 7ff64ba5e4dc 66227->66228 66229 7ff64b8f98a0 72 API calls 66228->66229 66230 7ff64ba5e4f6 66229->66230 66231 7ff64ba5e5e9 66230->66231 66239 7ff64ba5e651 66230->66239 66232 7ff64b8b3680 RtlFreeHeap 66231->66232 66233 7ff64ba5e639 66232->66233 66234 7ff64b8b3680 RtlFreeHeap 66233->66234 66284 7ff64ba5e644 66234->66284 66235 7ff64ba5ec12 66236 7ff64b8b3680 RtlFreeHeap 66235->66236 66237 7ff64ba5ec78 66236->66237 66238 7ff64b8b3680 RtlFreeHeap 66237->66238 66238->66284 66239->66235 66285 7ff64ba592b0 66239->66285 66241 7ff64ba5e7ca 66242 7ff64ba592b0 3 API calls 66241->66242 66247 7ff64ba5e830 66242->66247 66243 7ff64ba5ebfd 66341 7ff64b917300 SysFreeString 66243->66341 66245 7ff64ba5ec07 66342 7ff64b917300 SysFreeString 66245->66342 66247->66243 66248 7ff64b8b0450 49 API calls 66247->66248 66249 7ff64ba5e8f6 66248->66249 66293 7ff64b8f8e90 66249->66293 66251 7ff64ba5e913 66252 7ff64ba5e950 SysStringLen 66251->66252 66253 7ff64ba5e96a 66252->66253 66330 7ff64b8e49e0 66253->66330 66258 7ff64b8b0450 49 API calls 66260 7ff64ba5ea04 66258->66260 66259 7ff64ba5eb14 66263 7ff64ba5eb32 66259->66263 66265 7ff64b8b3680 RtlFreeHeap 66259->66265 66262 7ff64b8f8e90 72 API calls 66260->66262 66261 7ff64b8b3680 RtlFreeHeap 66261->66259 66264 7ff64ba5ea21 66262->66264 66266 7ff64ba5eb50 66263->66266 66267 7ff64b8b3680 RtlFreeHeap 66263->66267 66270 7ff64ba5ea5e SysStringLen 66264->66270 66265->66263 66268 7ff64ba5eb6e 66266->66268 66271 7ff64b8b3680 RtlFreeHeap 66266->66271 66267->66266 66268->66243 66269 7ff64ba5eb7c 66268->66269 66339 7ff64b917300 SysFreeString 66269->66339 66272 7ff64ba5ea78 66270->66272 66271->66268 66274 7ff64b8e49e0 59 API calls 66272->66274 66276 7ff64ba5ea9d 66274->66276 66275 7ff64ba5eba3 66340 7ff64b917300 SysFreeString 66275->66340 66278 7ff64b946bb0 2 API calls 66276->66278 66279 7ff64ba5ead5 66278->66279 66279->66259 66279->66261 66280 7ff64ba5ebae 66281 7ff64b8b3680 RtlFreeHeap 66280->66281 66282 7ff64ba5ebe5 66281->66282 66283 7ff64b8b3680 RtlFreeHeap 66282->66283 66283->66284 66284->65866 66286 7ff64ba592c4 66285->66286 66287 7ff64ba592ce 66285->66287 66343 7ff64b8b8370 RtlPcToFileHeader RaiseException 66286->66343 66289 7ff64ba592d6 66287->66289 66290 7ff64ba592e4 SysAllocStringLen 66287->66290 66289->66241 66291 7ff64ba59302 66290->66291 66291->66289 66344 7ff64b8b8370 RtlPcToFileHeader RaiseException 66291->66344 66294 7ff64b8f8eb6 66293->66294 66295 7ff64b8b11a0 51 API calls 66294->66295 66296 7ff64b8f8ec6 66295->66296 66297 7ff64b8b3c10 47 API calls 66296->66297 66300 7ff64b8f8eea 66297->66300 66299 7ff64b8f8fab 66301 7ff64b8f8fbc 66299->66301 66307 7ff64b8f9007 66299->66307 66345 7ff64b8f8610 66300->66345 66302 7ff64b8b05d0 59 API calls 66301->66302 66303 7ff64b8f8fc9 66302->66303 66357 7ff64b8f7fa0 66303->66357 66363 7ff64b8a97a0 51 API calls 66307->66363 66308 7ff64b8f8fec 66309 7ff64b8b3680 RtlFreeHeap 66308->66309 66310 7ff64b8f8ffa 66309->66310 66310->66251 66312 7ff64b8f909d 66364 7ff64b8a97a0 51 API calls 66312->66364 66314 7ff64b8f9152 66365 7ff64b8f9e60 66314->66365 66316 7ff64b8f9170 66370 7ff64b8b0510 66316->66370 66319 7ff64b8b3c10 47 API calls 66320 7ff64b8f91bd 66319->66320 66321 7ff64b8b3c10 47 API calls 66320->66321 66322 7ff64b8f91cb 66321->66322 66323 7ff64b8b3c10 47 API calls 66322->66323 66324 7ff64b8f91d9 66323->66324 66325 7ff64b8f7fa0 47 API calls 66324->66325 66326 7ff64b8f91e4 66325->66326 66327 7ff64b8b3be0 47 API calls 66326->66327 66328 7ff64b8f91f2 66327->66328 66329 7ff64b8b3680 RtlFreeHeap 66328->66329 66329->66310 66331 7ff64b8ba5a0 57 API calls 66330->66331 66332 7ff64b8e49f8 66331->66332 66469 7ff64b8e4880 66332->66469 66335 7ff64b946bb0 66336 7ff64b946bc8 66335->66336 66484 7ff64b8b8560 66336->66484 66338 7ff64b946bd5 66338->66258 66338->66279 66339->66275 66340->66280 66341->66245 66342->66235 66343->66287 66344->66289 66379 7ff64b8b0f30 66345->66379 66347 7ff64b8f8981 66348 7ff64b8f7fa0 47 API calls 66347->66348 66350 7ff64b8f89a8 66348->66350 66349 7ff64b8f8838 66349->66347 66385 7ff64b8f9e00 51 API calls 66349->66385 66352 7ff64b8b3be0 47 API calls 66350->66352 66353 7ff64b8f89b3 66352->66353 66353->66299 66356 7ff64b8f863a 66356->66349 66383 7ff64b8f9d60 50 API calls 66356->66383 66384 7ff64b8f9e00 51 API calls 66356->66384 66403 7ff64b8f84f0 66357->66403 66360 7ff64b8b3be0 66415 7ff64b8c2760 66360->66415 66362 7ff64b8b3bf3 66362->66308 66363->66312 66364->66314 66366 7ff64b8b10b0 51 API calls 66365->66366 66368 7ff64b8f9e90 66366->66368 66367 7ff64b8b3c10 47 API calls 66369 7ff64b8f9f83 66367->66369 66368->66367 66369->66316 66371 7ff64b8ba5a0 57 API calls 66370->66371 66372 7ff64b8b0523 66371->66372 66373 7ff64b8b03d0 2 API calls 66372->66373 66374 7ff64b8b0530 66373->66374 66420 7ff64b8b83e0 66374->66420 66377 7ff64b8b0556 66377->66319 66380 7ff64b8b0f57 66379->66380 66386 7ff64b8ab5d0 66380->66386 66382 7ff64b8b0f7c 66382->66356 66383->66356 66384->66356 66385->66349 66387 7ff64b8ab5f7 66386->66387 66389 7ff64b8ab603 66387->66389 66395 7ff64b8c2970 51 API calls 66387->66395 66391 7ff64b8ab63c 66389->66391 66392 7ff64b8aaf90 66389->66392 66391->66382 66396 7ff64b8aaf30 66392->66396 66395->66389 66399 7ff64b8c29b0 66396->66399 66400 7ff64b8c29c8 66399->66400 66401 7ff64b8aaef0 49 API calls 66400->66401 66402 7ff64b8aaf50 66401->66402 66402->66391 66405 7ff64b8f8503 66403->66405 66404 7ff64b8f7fb3 66404->66360 66405->66404 66407 7ff64b8c4850 66405->66407 66410 7ff64b8abc30 66407->66410 66409 7ff64b8c4878 66409->66404 66411 7ff64b8abc49 66410->66411 66413 7ff64b8abc58 66410->66413 66414 7ff64b8bea40 47 API calls 66411->66414 66413->66409 66414->66413 66416 7ff64b8c277d 66415->66416 66418 7ff64b8c27b9 66416->66418 66419 7ff64b8bf380 47 API calls 66416->66419 66418->66362 66419->66418 66421 7ff64b8b0540 66420->66421 66422 7ff64b8b83fb 66420->66422 66421->66377 66424 7ff64b8b5010 66421->66424 66422->66421 66427 7ff64b8ba8e0 58 API calls 66422->66427 66428 7ff64b8b4f20 66424->66428 66427->66421 66431 7ff64b8bc150 66428->66431 66432 7ff64b8bc168 66431->66432 66435 7ff64b8bc180 66432->66435 66436 7ff64b8bc1aa 66435->66436 66437 7ff64b8bc19a 66435->66437 66440 7ff64b8bc1bc 66436->66440 66454 7ff64b8b8370 RtlPcToFileHeader RaiseException 66436->66454 66453 7ff64b8b9650 RtlFreeHeap RtlPcToFileHeader RaiseException 66437->66453 66450 7ff64b8ba510 66440->66450 66443 7ff64b8bc242 66445 7ff64b8d0d40 47 API calls 66443->66445 66444 7ff64b8bc206 66455 7ff64b8b8740 47 API calls 66444->66455 66447 7ff64b8bc23f 66445->66447 66456 7ff64b8bae00 66447->66456 66449 7ff64b8b4f3d 66449->66377 66459 7ff64b8baa90 66450->66459 66453->66449 66454->66440 66455->66447 66465 7ff64b8bc0d0 66456->66465 66458 7ff64b8bae1b 66458->66449 66460 7ff64b8baaa4 66459->66460 66462 7ff64b8baaae 66459->66462 66461 7ff64b8b8370 RtlPcToFileHeader RaiseException 66460->66461 66461->66462 66463 7ff64b8ba52b 66462->66463 66464 7ff64b8ba9c0 51 API calls 66462->66464 66463->66443 66463->66444 66464->66463 66466 7ff64b8bc0e4 66465->66466 66467 7ff64b8b8370 RtlPcToFileHeader RaiseException 66466->66467 66468 7ff64b8bc101 66466->66468 66467->66468 66468->66458 66470 7ff64b8e4898 66469->66470 66470->66470 66472 7ff64b8e48d8 66470->66472 66481 7ff64b8b8370 RtlPcToFileHeader RaiseException 66470->66481 66473 7ff64b8e48f1 66472->66473 66482 7ff64b8b8370 RtlPcToFileHeader RaiseException 66472->66482 66475 7ff64b8e4927 66473->66475 66483 7ff64b8bea20 RtlPcToFileHeader RaiseException 66473->66483 66477 7ff64b8bc0d0 2 API calls 66475->66477 66478 7ff64b8e4945 66477->66478 66479 7ff64b8d0d40 47 API calls 66478->66479 66480 7ff64b8e496d 66479->66480 66480->66335 66481->66470 66482->66473 66483->66475 66485 7ff64b8b856e 66484->66485 66487 7ff64b8b85b9 66485->66487 66488 7ff64b8b8370 RtlPcToFileHeader RaiseException 66485->66488 66487->66338 66488->66485 66490 7ff64b8e17d7 66489->66490 66491 7ff64b8e1a38 66489->66491 66490->65873 66492 7ff64bac2bd0 4 API calls 66491->66492 66493 7ff64b8e1a42 66492->66493 66493->66490 66494 7ff64b8e1a4f 66493->66494 66497 7ff64b9609e0 77 API calls 66494->66497 66496 7ff64b8e1a63 66496->66490 66497->66496 66507 7ff64ba7bef0 66498->66507 66500 7ff64ba8af9e 66501 7ff64ba8b002 WlanAllocateMemory 66500->66501 66502 7ff64ba8b02b 66501->66502 66502->65877 66504 7ff64b94f496 66503->66504 66505 7ff64b94f4db CoInitializeEx CoInitializeSecurity CoCreateInstance IcmpCreateFile 66504->66505 66506 7ff64b8b19e0 66505->66506 66506->65880 66510 7ff64ba7bb40 66507->66510 66511 7ff64ba7bb71 66510->66511 66514 7ff64ba7d9a0 66511->66514 66513 7ff64ba7bb7c 66513->66500 66515 7ff64ba7d9b3 66514->66515 66518 7ff64ba76250 66515->66518 66517 7ff64ba7d9ea 66517->66513 66521 7ff64ba7f010 66518->66521 66520 7ff64ba76268 66520->66517 66526 7ff64ba78170 66521->66526 66524 7ff64b8aaef0 49 API calls 66525 7ff64ba7f030 66524->66525 66525->66520 66527 7ff64ba781a3 66526->66527 66528 7ff64ba7819e 66526->66528 66527->66524 66530 7ff64b8c2260 RtlPcToFileHeader RaiseException 66528->66530 66530->66527 66534 7ff64b8e4a20 66531->66534 66535 7ff64b8e4a51 66534->66535 66538 7ff64b8e6da0 66535->66538 66537 7ff64b8e4a5c 66537->65883 66539 7ff64b8e6db3 66538->66539 66542 7ff64b8e27d0 66539->66542 66541 7ff64b8e6dea 66541->66537 66545 7ff64b8e80e0 66542->66545 66544 7ff64b8e27e8 66544->66541 66550 7ff64b8e37a0 66545->66550 66548 7ff64b8aaef0 49 API calls 66549 7ff64b8e8100 66548->66549 66549->66544 66551 7ff64b8e37d3 66550->66551 66552 7ff64b8e37ce 66550->66552 66551->66548 66554 7ff64b8c2260 RtlPcToFileHeader RaiseException 66552->66554 66554->66551 66556 7ff64b8f818f 66555->66556 66557 7ff64b8f81c7 66556->66557 66593 7ff64b8f8200 47 API calls 66556->66593 66594 7ff64b8e6690 51 API calls 66556->66594 66560 7ff64b8b3c10 47 API calls 66557->66560 66561 7ff64b8f81eb 66560->66561 66562 7ff64b8f85c0 66561->66562 66563 7ff64b8f85e9 66562->66563 66595 7ff64b8c2d10 66563->66595 66565 7ff64b8f8602 66565->65895 66567 7ff64b8f85c0 51 API calls 66566->66567 66568 7ff64b8f815d 66567->66568 66568->65899 66570 7ff64b8b0f30 51 API calls 66569->66570 66579 7ff64b8f89ff 66570->66579 66571 7ff64b8f8ce7 66572 7ff64b8b3be0 47 API calls 66571->66572 66573 7ff64b8f8d0e 66572->66573 66575 7ff64b8b3be0 47 API calls 66573->66575 66574 7ff64b8f8cbf 66574->66571 66611 7ff64b8f8110 51 API calls 66574->66611 66577 7ff64b8f8d19 66575->66577 66577->65902 66578 7ff64b8f8b8e 66578->66571 66578->66574 66610 7ff64b8f8110 51 API calls 66578->66610 66579->66578 66609 7ff64b8f8110 51 API calls 66579->66609 66583 7ff64b8ba5a0 57 API calls 66582->66583 66584 7ff64b8b04c3 66583->66584 66585 7ff64b8b03d0 2 API calls 66584->66585 66586 7ff64b8b04d0 66585->66586 66587 7ff64b8b83e0 58 API calls 66586->66587 66588 7ff64b8b04e0 66587->66588 66589 7ff64b8b04f6 66588->66589 66612 7ff64b8b4f80 66588->66612 66589->65907 66591->65902 66592->65902 66593->66556 66594->66556 66596 7ff64b8c2dcf 66595->66596 66598 7ff64b8c2d4e 66595->66598 66599 7ff64b8ade60 66596->66599 66598->66565 66600 7ff64b8adea3 66599->66600 66602 7ff64b8adeb7 66600->66602 66607 7ff64b8c2970 51 API calls 66600->66607 66603 7ff64b8aaff0 49 API calls 66602->66603 66604 7ff64b8adf16 66603->66604 66606 7ff64b8adfb7 66604->66606 66608 7ff64b8bf3c0 47 API calls 66604->66608 66606->66598 66607->66602 66608->66606 66609->66579 66610->66578 66611->66574 66613 7ff64b8b4f96 66612->66613 66615 7ff64b8b4fa0 66612->66615 66625 7ff64b8ba4a0 66613->66625 66616 7ff64b8b4fbd 66615->66616 66617 7ff64b8b4ffa 66615->66617 66619 7ff64b8ba510 51 API calls 66616->66619 66629 7ff64b8b9650 RtlFreeHeap RtlPcToFileHeader RaiseException 66617->66629 66621 7ff64b8b4fcb 66619->66621 66620 7ff64b8b4ff7 66620->66589 66628 7ff64b8b8690 MultiByteToWideChar 66621->66628 66623 7ff64b8b4fe9 66624 7ff64b8bae00 2 API calls 66623->66624 66624->66620 66630 7ff64b8bebb0 66625->66630 66627 7ff64b8ba4ae MultiByteToWideChar 66627->66615 66628->66623 66629->66620 66630->66627 67659 7ff64b8ad5f0 67660 7ff64b8ad608 67659->67660 67665 7ff64b8afba0 67660->67665 67664 7ff64b8ad659 67670 7ff64b8bb130 67665->67670 67768 7ff64b8bafb0 67665->67768 67666 7ff64b8ad654 67669 7ff64baa1a54 60 API calls 67666->67669 67669->67664 67671 7ff64b8b11a0 51 API calls 67670->67671 67672 7ff64b8bb161 67671->67672 67673 7ff64b8f98a0 72 API calls 67672->67673 67674 7ff64b8bb17b 67673->67674 67675 7ff64b8b0450 49 API calls 67674->67675 67676 7ff64b8bb1e0 67675->67676 67677 7ff64b8f8e90 72 API calls 67676->67677 67678 7ff64b8bb1fd 67677->67678 67679 7ff64b8b3680 RtlFreeHeap 67678->67679 67680 7ff64b8bb227 RegisterClassExW 67679->67680 67681 7ff64b8bb24d 67680->67681 67682 7ff64b8bb23d 67680->67682 67684 7ff64b8b0450 49 API calls 67681->67684 67683 7ff64b8b3680 RtlFreeHeap 67682->67683 67685 7ff64b8bb247 67683->67685 67686 7ff64b8bb283 67684->67686 67685->67666 67687 7ff64b8f8e90 72 API calls 67686->67687 67688 7ff64b8bb2a0 67687->67688 67689 7ff64b8bb2b5 CreateWindowExW 67688->67689 67690 7ff64b8b3680 RtlFreeHeap 67689->67690 67691 7ff64b8bb33a 67690->67691 67692 7ff64b8bb35a ShowWindow 67691->67692 67693 7ff64b8bb34a 67691->67693 67695 7ff64b8bb384 67692->67695 67694 7ff64b8b3680 RtlFreeHeap 67693->67694 67694->67685 67790 7ff64b8cc710 67695->67790 67697 7ff64b8bb3bb 67794 7ff64b8cc1b0 67697->67794 67699 7ff64b8bb3cd 67700 7ff64b8b11a0 51 API calls 67699->67700 67701 7ff64b8bb40b 67700->67701 67702 7ff64b8f98a0 72 API calls 67701->67702 67703 7ff64b8bb428 67702->67703 67704 7ff64b8b11a0 51 API calls 67703->67704 67705 7ff64b8bb44d 67704->67705 67706 7ff64b8f98a0 72 API calls 67705->67706 67707 7ff64b8bb46a 67706->67707 67708 7ff64b8b0450 49 API calls 67707->67708 67709 7ff64b8bb490 67708->67709 67710 7ff64b8f8e90 72 API calls 67709->67710 67711 7ff64b8bb4ad 67710->67711 67712 7ff64b8b0450 49 API calls 67711->67712 67713 7ff64b8bb4fa 67712->67713 67714 7ff64b8f8e90 72 API calls 67713->67714 67715 7ff64b8bb517 67714->67715 67716 7ff64b8b5950 61 API calls 67715->67716 67717 7ff64b8bb54b 67716->67717 67801 7ff64b8b5880 67717->67801 67720 7ff64b8b3680 RtlFreeHeap 67721 7ff64b8bb59e 67720->67721 67722 7ff64b8b3680 RtlFreeHeap 67721->67722 67723 7ff64b8bb5ac 67722->67723 67724 7ff64b8b3680 RtlFreeHeap 67723->67724 67725 7ff64b8bb5ba 67724->67725 67726 7ff64b8bbfd8 67725->67726 67742 7ff64b8b11a0 51 API calls 67725->67742 67745 7ff64b8bbe5e OpenEventW 67725->67745 67749 7ff64b8bbe49 67725->67749 67752 7ff64b8f98a0 72 API calls 67725->67752 67754 7ff64b8b0510 68 API calls 67725->67754 67758 7ff64b8b0450 49 API calls 67725->67758 67763 7ff64b8f8e90 72 API calls 67725->67763 67764 7ff64b93d350 90 API calls 67725->67764 67766 7ff64b8c3b30 108 API calls 67725->67766 67767 7ff64b8b3680 RtlFreeHeap 67725->67767 67812 7ff64b8b50c0 67725->67812 67816 7ff64b935130 keybd_event keybd_event 67725->67816 67817 7ff64b8cd500 67725->67817 67845 7ff64b91ab70 190 API calls 67725->67845 67729 7ff64b8b3680 RtlFreeHeap 67726->67729 67731 7ff64b8bbff7 67729->67731 67730 7ff64b8bb602 GetWindowTextW 67734 7ff64b8bb62f 67730->67734 67732 7ff64b8b3680 RtlFreeHeap 67731->67732 67733 7ff64b8bc005 67732->67733 67735 7ff64b8b3680 RtlFreeHeap 67733->67735 67734->67730 67736 7ff64b8bb662 PeekMessageW 67734->67736 67737 7ff64b8bc013 67735->67737 67738 7ff64b8bbe21 SleepEx 67736->67738 67739 7ff64b8bb692 TranslateMessage DispatchMessageW 67736->67739 67740 7ff64b8b3c10 47 API calls 67737->67740 67738->67725 67739->67725 67741 7ff64b8bc021 67740->67741 67743 7ff64b8b3c10 47 API calls 67741->67743 67742->67725 67746 7ff64b8bc02f 67743->67746 67745->67725 67747 7ff64b8bbe82 WaitForSingleObject 67745->67747 67748 7ff64b8b3680 RtlFreeHeap 67746->67748 67747->67725 67757 7ff64b8bbe9a 67747->67757 67748->67685 67749->67725 67751 7ff64b8b11a0 51 API calls 67751->67757 67752->67725 67753 7ff64b8f98a0 72 API calls 67753->67757 67754->67725 67755 7ff64b8b3680 RtlFreeHeap 67755->67757 67756 7ff64b8b10b0 51 API calls 67756->67757 67757->67751 67757->67753 67757->67755 67757->67756 67846 7ff64b94db90 67757->67846 67758->67725 67761 7ff64b8b3c10 47 API calls 67762 7ff64b8bbfd2 67761->67762 67762->67725 67763->67725 67764->67725 67766->67725 67767->67725 67769 7ff64b8b11a0 51 API calls 67768->67769 67770 7ff64b8bafda 67769->67770 67771 7ff64b8f98a0 72 API calls 67770->67771 67772 7ff64b8bafee 67771->67772 67773 7ff64b8b11a0 51 API calls 67772->67773 67774 7ff64b8bb014 67773->67774 67775 7ff64b8b3680 RtlFreeHeap 67774->67775 67776 7ff64b8bb01f 67775->67776 67777 7ff64b8b10b0 51 API calls 67776->67777 67778 7ff64b8bb03c 67777->67778 67779 7ff64b8bb05f OpenEventW 67778->67779 67780 7ff64b8b3680 RtlFreeHeap 67779->67780 67782 7ff64b8bb07e 67780->67782 67905 7ff64ba7f160 67782->67905 68146 7ff64ba80140 67782->68146 67785 7ff64b8bb0a8 67786 7ff64b8bb0b0 CloseHandle 67785->67786 67787 7ff64b8bb0bc 67785->67787 67786->67787 67788 7ff64b8b3c10 47 API calls 67787->67788 67789 7ff64b8bb0c6 67788->67789 67789->67666 67791 7ff64b8cc72e 67790->67791 67793 7ff64b8cc73f 67791->67793 67882 7ff64b8c2e10 67791->67882 67793->67697 67795 7ff64b8cc1d4 67794->67795 67798 7ff64b8cc1cf 67794->67798 67796 7ff64b8cc1f9 67795->67796 67795->67798 67799 7ff64b8cc24c 67795->67799 67887 7ff64b8adcd0 51 API calls 67796->67887 67798->67699 67799->67798 67888 7ff64b8becb0 47 API calls 67799->67888 67802 7ff64b8ba780 57 API calls 67801->67802 67803 7ff64b8b58a5 67802->67803 67804 7ff64b8b0480 2 API calls 67803->67804 67805 7ff64b8b58b2 67804->67805 67806 7ff64b8b85e0 51 API calls 67805->67806 67807 7ff64b8b5914 67806->67807 67808 7ff64b8b0450 49 API calls 67807->67808 67809 7ff64b8b5923 67808->67809 67810 7ff64b8b3680 RtlFreeHeap 67809->67810 67811 7ff64b8b5938 67810->67811 67811->67720 67813 7ff64b8b50d8 67812->67813 67814 7ff64b8c3020 51 API calls 67813->67814 67815 7ff64b8b50df GetForegroundWindow 67813->67815 67814->67815 67815->67734 67816->67749 67818 7ff64b8b11a0 51 API calls 67817->67818 67819 7ff64b8cd52e 67818->67819 67820 7ff64b8f98a0 72 API calls 67819->67820 67821 7ff64b8cd542 67820->67821 67822 7ff64b8b11a0 51 API calls 67821->67822 67823 7ff64b8cd56b 67822->67823 67824 7ff64b8b3680 RtlFreeHeap 67823->67824 67825 7ff64b8cd576 67824->67825 67826 7ff64b8b11a0 51 API calls 67825->67826 67827 7ff64b8cd595 67826->67827 67828 7ff64b8f98a0 72 API calls 67827->67828 67829 7ff64b8cd5b2 67828->67829 67830 7ff64b8b11a0 51 API calls 67829->67830 67831 7ff64b8cd5e7 67830->67831 67832 7ff64b8b3680 RtlFreeHeap 67831->67832 67833 7ff64b8cd5f5 GetModuleFileNameW 67832->67833 67834 7ff64b8b10b0 51 API calls 67833->67834 67835 7ff64b8cd632 67834->67835 67836 7ff64b8cd664 RegOpenKeyExW 67835->67836 67837 7ff64b8b3680 RtlFreeHeap 67836->67837 67838 7ff64b8cd698 67837->67838 67839 7ff64b8cd705 67838->67839 67840 7ff64b8cd6a0 RegSetValueExW RegCloseKey 67838->67840 67841 7ff64b8b3c10 47 API calls 67839->67841 67840->67839 67842 7ff64b8cd712 67841->67842 67843 7ff64b8b3c10 47 API calls 67842->67843 67844 7ff64b8cd720 67843->67844 67844->67725 67845->67725 67847 7ff64b94dbb4 67846->67847 67860 7ff64b94dc0c 67846->67860 67889 7ff64b94ce80 62 API calls 67847->67889 67849 7ff64b94dc79 67854 7ff64b94dce6 67849->67854 67893 7ff64b94ce80 62 API calls 67849->67893 67850 7ff64b94dbdd 67890 7ff64b94cf00 82 API calls 67850->67890 67853 7ff64b94dd53 67861 7ff64b94ddc0 67853->67861 67897 7ff64b94ce80 62 API calls 67853->67897 67854->67853 67895 7ff64b94ce80 62 API calls 67854->67895 67856 7ff64b94dc44 67892 7ff64b94cf00 82 API calls 67856->67892 67858 7ff64b94dcb1 67894 7ff64b94cf00 82 API calls 67858->67894 67860->67849 67891 7ff64b94ce80 62 API calls 67860->67891 67863 7ff64b94de2d 67861->67863 67899 7ff64b94ce80 62 API calls 67861->67899 67868 7ff64b94de9a 67863->67868 67901 7ff64b94ce80 62 API calls 67863->67901 67865 7ff64b94dd1e 67896 7ff64b94cf00 82 API calls 67865->67896 67866 7ff64b94dd8b 67898 7ff64b94cf00 82 API calls 67866->67898 67870 7ff64b94df09 67868->67870 67903 7ff64b94ce80 62 API calls 67868->67903 67878 7ff64b8b3680 RtlFreeHeap 67870->67878 67872 7ff64b94ddf8 67900 7ff64b94cf00 82 API calls 67872->67900 67876 7ff64b94de65 67902 7ff64b94cf00 82 API calls 67876->67902 67877 7ff64b94ded4 67904 7ff64b94cf00 82 API calls 67877->67904 67881 7ff64b8bbfb8 CloseHandle 67878->67881 67881->67761 67883 7ff64b8c2ed1 67882->67883 67885 7ff64b8c2e4f 67882->67885 67886 7ff64b8ae3f0 51 API calls 67883->67886 67885->67793 67886->67885 67887->67798 67888->67798 67889->67850 67890->67860 67891->67856 67892->67849 67893->67858 67894->67854 67895->67865 67896->67853 67897->67866 67898->67861 67899->67872 67900->67863 67901->67876 67902->67868 67903->67877 67904->67870 67906 7ff64b8b0f30 51 API calls 67905->67906 67907 7ff64ba7f18e 67906->67907 68387 7ff64b8f9aa0 67907->68387 67910 7ff64b8b0f30 51 API calls 67911 7ff64ba7f1d0 67910->67911 67912 7ff64b8f9aa0 59 API calls 67911->67912 67913 7ff64ba7f1ed 67912->67913 67914 7ff64b8b0f30 51 API calls 67913->67914 67915 7ff64ba7f212 67914->67915 67916 7ff64b8f9aa0 59 API calls 67915->67916 67917 7ff64ba7f22f 67916->67917 67918 7ff64b8b0f30 51 API calls 67917->67918 67919 7ff64ba7f254 67918->67919 67920 7ff64b8f9aa0 59 API calls 67919->67920 67921 7ff64ba7f271 67920->67921 67922 7ff64b8b0f30 51 API calls 67921->67922 67923 7ff64ba7f296 67922->67923 67924 7ff64b8f9aa0 59 API calls 67923->67924 67925 7ff64ba7f2b3 67924->67925 68417 7ff64b8b0e90 67925->68417 67938 7ff64b8d9140 47 API calls 67939 7ff64ba7f3a9 67938->67939 67940 7ff64b8b3be0 47 API calls 67939->67940 68147 7ff64b8b0f30 51 API calls 68146->68147 68148 7ff64ba8016e 68147->68148 68149 7ff64b8f9aa0 59 API calls 68148->68149 68150 7ff64ba8018b 68149->68150 68151 7ff64b8b0f30 51 API calls 68150->68151 68152 7ff64ba801b0 68151->68152 68153 7ff64b8f9aa0 59 API calls 68152->68153 68154 7ff64ba801cd 68153->68154 68155 7ff64b8b0f30 51 API calls 68154->68155 68156 7ff64ba801f2 68155->68156 68157 7ff64b8f9aa0 59 API calls 68156->68157 68158 7ff64ba8020f 68157->68158 68159 7ff64b8b0f30 51 API calls 68158->68159 68160 7ff64ba80234 68159->68160 68161 7ff64b8f9aa0 59 API calls 68160->68161 68162 7ff64ba80251 68161->68162 68163 7ff64b8b0f30 51 API calls 68162->68163 68164 7ff64ba80276 68163->68164 68165 7ff64b8f9aa0 59 API calls 68164->68165 68166 7ff64ba80293 68165->68166 68167 7ff64b8b0e90 51 API calls 68166->68167 68168 7ff64ba802b9 68167->68168 68169 7ff64b8f9580 54 API calls 68168->68169 68170 7ff64ba802d6 68169->68170 68171 7ff64b93f8f0 54 API calls 68170->68171 68172 7ff64ba80306 68171->68172 68173 7ff64ba7caf0 52 API calls 68172->68173 68174 7ff64ba80338 68173->68174 68175 7ff64b9388f0 51 API calls 68174->68175 68176 7ff64ba8036d 68175->68176 68177 7ff64b8d9140 47 API calls 68176->68177 68178 7ff64ba8037b 68177->68178 68179 7ff64b8d9140 47 API calls 68178->68179 68180 7ff64ba80389 68179->68180 68181 7ff64b8b3be0 47 API calls 68180->68181 68182 7ff64ba80397 68181->68182 68183 7ff64ba87830 99 API calls 68182->68183 68184 7ff64ba803b8 68183->68184 68185 7ff64b8b0e90 51 API calls 68184->68185 68186 7ff64ba803de 68185->68186 68187 7ff64b8f9580 54 API calls 68186->68187 68188 7ff64ba803fb 68187->68188 68189 7ff64b93f8f0 54 API calls 68188->68189 68190 7ff64ba8042b 68189->68190 68191 7ff64b9388f0 51 API calls 68190->68191 68192 7ff64ba80449 68191->68192 68193 7ff64b92bf80 75 API calls 68192->68193 68194 7ff64ba8046e 68193->68194 68195 7ff64b8d9140 47 API calls 68194->68195 68196 7ff64ba8047f 68195->68196 68197 7ff64b8d9140 47 API calls 68196->68197 68198 7ff64ba8048d 68197->68198 68199 7ff64b8b3be0 47 API calls 68198->68199 68200 7ff64ba8049b 68199->68200 68201 7ff64ba8058f 68200->68201 68202 7ff64b8b0e90 51 API calls 68200->68202 68203 7ff64b8b0e90 51 API calls 68201->68203 68204 7ff64ba804cd 68202->68204 68205 7ff64ba805b5 68203->68205 68206 7ff64b8f9580 54 API calls 68204->68206 68207 7ff64b8f9580 54 API calls 68205->68207 68208 7ff64ba804ea 68206->68208 68209 7ff64ba805d2 68207->68209 68210 7ff64b93f8f0 54 API calls 68208->68210 68211 7ff64b93f8f0 54 API calls 68209->68211 68212 7ff64ba8051a 68210->68212 68213 7ff64ba80602 68211->68213 68214 7ff64b9388f0 51 API calls 68212->68214 68215 7ff64b9388f0 51 API calls 68213->68215 68216 7ff64ba80538 68214->68216 68217 7ff64ba80620 68215->68217 69453 7ff64ba87d20 51 API calls 68216->69453 68219 7ff64b92bf80 75 API calls 68217->68219 68221 7ff64ba80645 68219->68221 68220 7ff64ba80565 68222 7ff64b8d9140 47 API calls 68220->68222 68223 7ff64b8d9140 47 API calls 68221->68223 68224 7ff64ba80573 68222->68224 68225 7ff64ba80656 68223->68225 68226 7ff64b8d9140 47 API calls 68224->68226 68227 7ff64b8d9140 47 API calls 68225->68227 68228 7ff64ba80581 68226->68228 68229 7ff64ba80664 68227->68229 68231 7ff64b8b3be0 47 API calls 68228->68231 68230 7ff64b8b3be0 47 API calls 68229->68230 68232 7ff64ba80672 68230->68232 68231->68201 68233 7ff64b8b0e90 51 API calls 68232->68233 68239 7ff64ba80766 68232->68239 68234 7ff64ba806a4 68233->68234 68235 7ff64b8f9580 54 API calls 68234->68235 68236 7ff64ba806c1 68235->68236 68237 7ff64b93f8f0 54 API calls 68236->68237 68238 7ff64ba806f1 68237->68238 68241 7ff64b9388f0 51 API calls 68238->68241 68240 7ff64ba80a6d 68239->68240 68242 7ff64b8b0e90 51 API calls 68239->68242 68248 7ff64b8b11a0 51 API calls 68240->68248 68386 7ff64ba8109b 68240->68386 68243 7ff64ba8070f 68241->68243 68244 7ff64ba807e7 68242->68244 69454 7ff64ba87d20 51 API calls 68243->69454 68246 7ff64b8f9580 54 API calls 68244->68246 68250 7ff64ba80804 68246->68250 68247 7ff64ba7c450 47 API calls 68251 7ff64ba810a9 68247->68251 68252 7ff64ba80aac 68248->68252 68249 7ff64ba8073c 68253 7ff64b8d9140 47 API calls 68249->68253 68254 7ff64b93f8f0 54 API calls 68250->68254 68255 7ff64ba7c430 47 API calls 68251->68255 68256 7ff64b8f98a0 72 API calls 68252->68256 68257 7ff64ba8074a 68253->68257 68258 7ff64ba80834 68254->68258 68260 7ff64ba810b4 68255->68260 68261 7ff64ba80ac9 68256->68261 68262 7ff64b8d9140 47 API calls 68257->68262 68259 7ff64b9388f0 51 API calls 68258->68259 68264 7ff64ba8084f 68259->68264 68265 7ff64b8d9140 47 API calls 68260->68265 68266 7ff64b8b11a0 51 API calls 68261->68266 68263 7ff64ba80758 68262->68263 68268 7ff64b8b3be0 47 API calls 68263->68268 68269 7ff64b92bf80 75 API calls 68264->68269 68270 7ff64ba810c2 68265->68270 68267 7ff64ba80aee 68266->68267 68271 7ff64b8f98a0 72 API calls 68267->68271 68268->68239 68272 7ff64ba80874 68269->68272 68273 7ff64b8b3be0 47 API calls 68270->68273 68274 7ff64ba80b0b 68271->68274 68275 7ff64b8d9140 47 API calls 68272->68275 68276 7ff64ba810d0 68273->68276 68277 7ff64b8b11a0 51 API calls 68274->68277 68278 7ff64ba80885 68275->68278 68279 7ff64b8b3be0 47 API calls 68276->68279 68280 7ff64ba80b30 68277->68280 68281 7ff64b8d9140 47 API calls 68278->68281 68282 7ff64ba810de 68279->68282 68283 7ff64b8f98a0 72 API calls 68280->68283 68284 7ff64ba80893 68281->68284 68285 7ff64b8b3be0 47 API calls 68282->68285 68286 7ff64ba80b4d 68283->68286 68287 7ff64b8b3be0 47 API calls 68284->68287 68288 7ff64ba810ec 68285->68288 68290 7ff64b8b11a0 51 API calls 68286->68290 68291 7ff64ba808a1 68287->68291 68289 7ff64b8b3be0 47 API calls 68288->68289 68292 7ff64ba810fa 68289->68292 68293 7ff64ba80b72 68290->68293 68291->68240 68296 7ff64b8b0e90 51 API calls 68291->68296 68294 7ff64b8b3be0 47 API calls 68292->68294 68295 7ff64b8f98a0 72 API calls 68293->68295 68297 7ff64b8bb089 WaitForSingleObject 68294->68297 68301 7ff64ba80b8f 68295->68301 68298 7ff64ba808d3 68296->68298 68297->67782 68297->67785 68299 7ff64b8f9580 54 API calls 68298->68299 68300 7ff64ba808f0 68299->68300 68302 7ff64b93f8f0 54 API calls 68300->68302 69456 7ff64ba7b4e0 47 API calls 68301->69456 68303 7ff64ba80920 68302->68303 68304 7ff64b9388f0 51 API calls 68303->68304 68306 7ff64ba8093b 68304->68306 68307 7ff64ba87270 120 API calls 68306->68307 68308 7ff64ba80968 68307->68308 68309 7ff64b8d9140 47 API calls 68308->68309 68310 7ff64ba80976 68309->68310 68311 7ff64b8d9140 47 API calls 68310->68311 68313 7ff64ba80984 68311->68313 68312 7ff64ba80bdf 69457 7ff64ba7b760 47 API calls 68312->69457 68315 7ff64b8b3be0 47 API calls 68313->68315 68318 7ff64ba80992 68315->68318 68316 7ff64ba80c42 69458 7ff64ba87e90 51 API calls 68316->69458 69455 7ff64ba7b360 51 API calls 68318->69455 68319 7ff64ba80c96 68321 7ff64b8b05d0 59 API calls 68319->68321 68322 7ff64ba80ca1 68321->68322 68324 7ff64b8b11a0 51 API calls 68322->68324 68323 7ff64ba80a5f 68325 7ff64ba7c430 47 API calls 68323->68325 68326 7ff64ba80cc6 68324->68326 68325->68240 68327 7ff64b8f98a0 72 API calls 68326->68327 68328 7ff64ba80ce0 68327->68328 69459 7ff64ba75480 51 API calls 68328->69459 68330 7ff64ba80cf3 69460 7ff64b8dc650 51 API calls 68330->69460 68332 7ff64ba80d1f 68333 7ff64b8b04b0 70 API calls 68332->68333 68334 7ff64ba80d54 68333->68334 68335 7ff64b8b0450 49 API calls 68334->68335 68336 7ff64ba80da1 68335->68336 68337 7ff64b8f8e90 72 API calls 68336->68337 68338 7ff64ba80dbe 68337->68338 68339 7ff64b8ba250 70 API calls 68338->68339 68340 7ff64ba80e05 68339->68340 68341 7ff64b8b3680 RtlFreeHeap 68340->68341 68342 7ff64ba80e13 68341->68342 68343 7ff64b8b3680 RtlFreeHeap 68342->68343 68344 7ff64ba80e21 68343->68344 68345 7ff64b8b3be0 47 API calls 68344->68345 68346 7ff64ba80e2f 68345->68346 68347 7ff64b8b0450 49 API calls 68346->68347 68348 7ff64ba80e55 68347->68348 68386->68247 68388 7ff64b8b11a0 51 API calls 68387->68388 68389 7ff64b8f9acd 68388->68389 68390 7ff64b8f8170 51 API calls 68389->68390 68391 7ff64b8f9ae0 68390->68391 68392 7ff64b8f85c0 51 API calls 68391->68392 68393 7ff64b8f9af6 68392->68393 68646 7ff64b8ecad0 68393->68646 68396 7ff64b8f9e60 51 API calls 68397 7ff64b8f9b35 68396->68397 68398 7ff64b8f8140 51 API calls 68397->68398 68399 7ff64b8f9b56 68398->68399 68400 7ff64b8b3c10 47 API calls 68399->68400 68401 7ff64b8f9b64 68400->68401 68402 7ff64b8b3c10 47 API calls 68401->68402 68403 7ff64b8f9b72 68402->68403 68404 7ff64b8f89d0 51 API calls 68403->68404 68405 7ff64b8f9bad 68404->68405 68406 7ff64b8f9c64 68405->68406 68655 7ff64b8f8200 47 API calls 68405->68655 68656 7ff64b8f9cd0 51 API calls 68405->68656 68407 7ff64b8b3be0 47 API calls 68406->68407 68409 7ff64b8f9c91 68407->68409 68411 7ff64b8b3c10 47 API calls 68409->68411 68412 7ff64b8f9c9f 68411->68412 68413 7ff64b8b3c10 47 API calls 68412->68413 68414 7ff64b8f9cad 68413->68414 68415 7ff64b8b3be0 47 API calls 68414->68415 68416 7ff64b8f9cbb 68415->68416 68416->67910 68418 7ff64b8b0eb2 68417->68418 68712 7ff64b8ab760 68418->68712 68420 7ff64b8b0f16 68421 7ff64b8f9580 68420->68421 68424 7ff64b8f95ab 68421->68424 68422 7ff64b8f8610 54 API calls 68423 7ff64b8f9659 68422->68423 68425 7ff64b8f966a 68423->68425 68430 7ff64b8f96a7 68423->68430 68424->68422 68426 7ff64b8f7fa0 47 API calls 68425->68426 68427 7ff64b8f968c 68426->68427 68428 7ff64b8b3be0 47 API calls 68427->68428 68429 7ff64b8f969a 68428->68429 68446 7ff64b93f8f0 68429->68446 68719 7ff64b8a97a0 51 API calls 68430->68719 68432 7ff64b8f973d 68720 7ff64b8a97a0 51 API calls 68432->68720 68434 7ff64b8f97f2 68435 7ff64b8f9e60 51 API calls 68434->68435 68436 7ff64b8f9810 68435->68436 68437 7ff64b8b3c10 47 API calls 68436->68437 68438 7ff64b8f9855 68437->68438 68439 7ff64b8b3c10 47 API calls 68438->68439 68440 7ff64b8f9863 68439->68440 68441 7ff64b8b3c10 47 API calls 68440->68441 68442 7ff64b8f9871 68441->68442 68443 7ff64b8f7fa0 47 API calls 68442->68443 68444 7ff64b8f987c 68443->68444 68445 7ff64b8b3be0 47 API calls 68444->68445 68445->68429 68721 7ff64b93ff10 68446->68721 68449 7ff64ba7caf0 68450 7ff64ba7cb23 68449->68450 68451 7ff64ba7cb54 68450->68451 68452 7ff64ba7cb2e 68450->68452 68762 7ff64b8fe140 51 API calls 68451->68762 68761 7ff64ba75250 51 API calls 68452->68761 68455 7ff64ba7cb66 CoTaskMemFree 68457 7ff64ba7cb80 68455->68457 68456 7ff64ba7cb42 68459 7ff64b9388f0 68456->68459 68458 7ff64b8d9140 47 API calls 68457->68458 68458->68456 68463 7ff64b938920 68459->68463 68460 7ff64b938afb 68764 7ff64b8d7620 68460->68764 68463->68460 68467 7ff64b938992 68463->68467 68465 7ff64b938b26 68466 7ff64b8d9140 47 API calls 68465->68466 68471 7ff64b938af1 68466->68471 68763 7ff64b937ee0 51 API calls 68467->68763 68469 7ff64b938ac9 68470 7ff64b8d9140 47 API calls 68469->68470 68470->68471 68472 7ff64b8d9140 68471->68472 68473 7ff64b8b3c10 47 API calls 68472->68473 68474 7ff64b8d9156 68473->68474 68474->67938 68657 7ff64b8e5230 68646->68657 68648 7ff64b8ecaf3 68664 7ff64b8eab10 68648->68664 68650 7ff64b8ecb0b 68651 7ff64b8b3c10 47 API calls 68650->68651 68652 7ff64b8ecb32 68651->68652 68668 7ff64b8e58f0 68652->68668 68654 7ff64b8ecb3d 68654->68396 68655->68405 68656->68405 68658 7ff64b8b3410 59 API calls 68657->68658 68659 7ff64b8e5259 68658->68659 68660 7ff64bac2bd0 4 API calls 68659->68660 68661 7ff64b8e52a3 68660->68661 68663 7ff64b8e52bc 68661->68663 68673 7ff64b8e4f30 57 API calls 68661->68673 68663->68648 68665 7ff64b8eab35 68664->68665 68674 7ff64b8eab80 68665->68674 68669 7ff64b8b3c10 47 API calls 68668->68669 68670 7ff64b8e5919 68669->68670 68671 7ff64b8b3be0 47 API calls 68670->68671 68672 7ff64b8e592a 68671->68672 68672->68654 68673->68663 68675 7ff64b8eabae 68674->68675 68676 7ff64b8c2e10 51 API calls 68675->68676 68680 7ff64b8eac11 68676->68680 68677 7ff64b8b3c10 47 API calls 68678 7ff64b8eaed8 68677->68678 68679 7ff64b8b3c10 47 API calls 68678->68679 68681 7ff64b8eab66 68679->68681 68682 7ff64b8ead28 68680->68682 68687 7ff64b8ead5c 68680->68687 68690 7ff64b8ead18 68680->68690 68681->68650 68683 7ff64b8ead34 68682->68683 68684 7ff64b8ead62 68682->68684 68685 7ff64b8c2d10 51 API calls 68683->68685 68688 7ff64b8ead72 68684->68688 68689 7ff64b8ead87 68684->68689 68685->68687 68686 7ff64b8ead23 68686->68687 68691 7ff64b8eae4e 68686->68691 68692 7ff64b8eae99 68686->68692 68687->68677 68694 7ff64b8c2e10 51 API calls 68688->68694 68696 7ff64b8eade5 68689->68696 68697 7ff64b8ead97 68689->68697 68690->68686 68710 7ff64b8eb9d0 51 API calls 68690->68710 68698 7ff64b8b10b0 51 API calls 68691->68698 68711 7ff64b8e7f30 51 API calls 68692->68711 68694->68687 68709 7ff64b8e7f30 51 API calls 68696->68709 68701 7ff64b8b10b0 51 API calls 68697->68701 68699 7ff64b8eae6a 68698->68699 68703 7ff64b8b3c10 47 API calls 68699->68703 68702 7ff64b8eadb3 68701->68702 68704 7ff64b8b3c10 47 API calls 68702->68704 68705 7ff64b8eae82 68703->68705 68706 7ff64b8eadcb 68704->68706 68707 7ff64b8b3c10 47 API calls 68705->68707 68708 7ff64b8b3c10 47 API calls 68706->68708 68707->68681 68708->68681 68709->68687 68710->68690 68711->68687 68713 7ff64b8ab787 68712->68713 68715 7ff64b8ab796 68713->68715 68718 7ff64b8c2970 51 API calls 68713->68718 68716 7ff64b8aaf90 49 API calls 68715->68716 68717 7ff64b8ab7d2 68715->68717 68716->68717 68717->68420 68718->68715 68719->68432 68720->68434 68722 7ff64b93ff3c 68721->68722 68725 7ff64b937cb0 68722->68725 68730 7ff64baa7358 68725->68730 68751 7ff64badab18 68730->68751 68733 7ff64b937ce6 68735 7ff64b939a70 68733->68735 68734 7ff64baa736a AreFileApisANSI 68734->68733 68739 7ff64b939a97 68735->68739 68736 7ff64b939ba8 68737 7ff64b8b3c10 47 API calls 68736->68737 68738 7ff64b937d14 68737->68738 68738->68449 68739->68736 68741 7ff64b939ad6 68739->68741 68756 7ff64b924c30 51 API calls 68739->68756 68757 7ff64baa7380 MultiByteToWideChar GetLastError 68741->68757 68743 7ff64b939b1b 68758 7ff64b91f420 51 API calls 68743->68758 68745 7ff64b939b2a 68746 7ff64b8cc710 51 API calls 68745->68746 68747 7ff64b939b43 68746->68747 68759 7ff64baa7380 MultiByteToWideChar GetLastError 68747->68759 68749 7ff64b939b99 68760 7ff64b91f420 51 API calls 68749->68760 68752 7ff64bae09fc 47 API calls 68751->68752 68753 7ff64badab21 68752->68753 68754 7ff64bae0e70 47 API calls 68753->68754 68755 7ff64baa7361 68754->68755 68755->68733 68755->68734 68756->68741 68757->68743 68758->68745 68759->68749 68760->68736 68761->68456 68762->68455 68763->68469 68765 7ff64b8b10b0 51 API calls 68764->68765 68766 7ff64b8d764a 68765->68766 68767 7ff64b938cd0 68766->68767 68768 7ff64b938ceb 68767->68768 68769 7ff64b938cf2 68768->68769 68772 7ff64b938d0c 68768->68772 68785 7ff64b938640 51 API calls 68769->68785 68771 7ff64b938e37 68774 7ff64b938e43 68771->68774 68781 7ff64b938e7a 68771->68781 68773 7ff64b938ddd 68772->68773 68775 7ff64b938dc3 68772->68775 68773->68771 68778 7ff64b938e04 68773->68778 68776 7ff64b938e31 68774->68776 68788 7ff64b8eb9d0 51 API calls 68774->68788 68786 7ff64b938640 51 API calls 68775->68786 68787 7ff64b93a370 51 API calls 68778->68787 68780 7ff64b938d07 68780->68465 68781->68776 68789 7ff64b8eb9d0 51 API calls 68781->68789 68785->68780 68786->68780 68787->68776 68788->68776 68789->68776 69453->68220 69454->68249 69455->68323 69456->68312 69457->68316 69458->68319 69459->68330 69460->68332 69461 7ff64b8bc290 69462 7ff64b8bc2a8 69461->69462 69920 7ff64b8ca0d0 69462->69920 69465 7ff64b8cd500 76 API calls 69466 7ff64b8bc2ca 69465->69466 69467 7ff64b8b11a0 51 API calls 69466->69467 69468 7ff64b8bc2ef 69467->69468 69469 7ff64b8f98a0 72 API calls 69468->69469 69470 7ff64b8bc309 69469->69470 69471 7ff64b8b11a0 51 API calls 69470->69471 69472 7ff64b8bc32e 69471->69472 69473 7ff64b8f98a0 72 API calls 69472->69473 69474 7ff64b8bc348 69473->69474 69475 7ff64b8b11a0 51 API calls 69474->69475 69476 7ff64b8bc36d 69475->69476 69477 7ff64b8f98a0 72 API calls 69476->69477 69478 7ff64b8bc387 69477->69478 69479 7ff64b8b11a0 51 API calls 69478->69479 69480 7ff64b8bc3ac 69479->69480 69481 7ff64b8f98a0 72 API calls 69480->69481 69482 7ff64b8bc3c6 69481->69482 69483 7ff64b8b11a0 51 API calls 69482->69483 69484 7ff64b8bc3eb 69483->69484 69485 7ff64b8f98a0 72 API calls 69484->69485 69486 7ff64b8bc405 69485->69486 69487 7ff64b8b11a0 51 API calls 69486->69487 69488 7ff64b8bc42a 69487->69488 69489 7ff64b8f98a0 72 API calls 69488->69489 69490 7ff64b8bc447 69489->69490 69491 7ff64b8b11a0 51 API calls 69490->69491 69492 7ff64b8bc47c 69491->69492 69493 7ff64b8b3680 RtlFreeHeap 69492->69493 69494 7ff64b8bc48a 69493->69494 69495 7ff64b8b11a0 51 API calls 69494->69495 69496 7ff64b8bc4af 69495->69496 69497 7ff64b8f98a0 72 API calls 69496->69497 69498 7ff64b8bc4c9 69497->69498 69499 7ff64b8b05d0 59 API calls 69498->69499 69500 7ff64b8bc4d4 69499->69500 70031 7ff64b91a6b0 69500->70031 69502 7ff64b8bc4e2 69503 7ff64b8ba250 70 API calls 69502->69503 69504 7ff64b8bc54c 69503->69504 69505 7ff64b8b3680 RtlFreeHeap 69504->69505 69506 7ff64b8bc55a 69505->69506 69507 7ff64b8b0510 68 API calls 69506->69507 69508 7ff64b8bc56f 69507->69508 69509 7ff64b8b0510 68 API calls 69508->69509 69510 7ff64b8bc584 69509->69510 69511 7ff64b8b0450 49 API calls 69510->69511 69512 7ff64b8bc5a7 69511->69512 69513 7ff64b8f8e90 72 API calls 69512->69513 69514 7ff64b8bc5c4 69513->69514 69515 7ff64b8b0450 49 API calls 69514->69515 69516 7ff64b8bc60e 69515->69516 69517 7ff64b8f8e90 72 API calls 69516->69517 69518 7ff64b8bc62b 69517->69518 69519 7ff64b93ca30 77 API calls 69518->69519 69520 7ff64b8bc682 69519->69520 69521 7ff64b8b3680 RtlFreeHeap 69520->69521 69522 7ff64b8bc690 69521->69522 69523 7ff64b8b3680 RtlFreeHeap 69522->69523 69524 7ff64b8bc69e 69523->69524 69525 7ff64b8b3680 RtlFreeHeap 69524->69525 69526 7ff64b8bc6ac 69525->69526 69527 7ff64b8b3680 RtlFreeHeap 69526->69527 69528 7ff64b8bc6ba 69527->69528 70053 7ff64b8a8ad0 69528->70053 69921 7ff64b8c62c0 75 API calls 69920->69921 69922 7ff64b8ca0e9 69921->69922 69923 7ff64b8b11a0 51 API calls 69922->69923 70030 7ff64b8bc2b8 69922->70030 69924 7ff64b8ca11c 69923->69924 69925 7ff64b8f98a0 72 API calls 69924->69925 69926 7ff64b8ca136 69925->69926 69927 7ff64b8b11a0 51 API calls 69926->69927 69928 7ff64b8ca15b 69927->69928 69929 7ff64b8f98a0 72 API calls 69928->69929 69930 7ff64b8ca175 69929->69930 69931 7ff64b8b05d0 59 API calls 69930->69931 69932 7ff64b8ca180 69931->69932 69933 7ff64b8b05d0 59 API calls 69932->69933 69934 7ff64b8ca18b 69933->69934 69935 7ff64b8ca1ab 69934->69935 69936 7ff64b8ca19b 69934->69936 69939 7ff64b8b11a0 51 API calls 69935->69939 69937 7ff64b8ca22a 69936->69937 69938 7ff64b8ca1a6 69936->69938 69940 7ff64b8b11a0 51 API calls 69937->69940 69943 7ff64b8b05d0 59 API calls 69938->69943 69941 7ff64b8ca1cf 69939->69941 69942 7ff64b8ca24e 69940->69942 69944 7ff64b8f98a0 72 API calls 69941->69944 69945 7ff64b8f98a0 72 API calls 69942->69945 69946 7ff64b8ca2b3 69943->69946 69947 7ff64b8ca1ec 69944->69947 69948 7ff64b8ca26b 69945->69948 69949 7ff64b8b11a0 51 API calls 69946->69949 69950 7ff64b8b4f50 51 API calls 69947->69950 69951 7ff64b8b4f50 51 API calls 69948->69951 69952 7ff64b8ca2d8 69949->69952 69953 7ff64b8ca216 69950->69953 69954 7ff64b8ca295 69951->69954 69955 7ff64b8f98a0 72 API calls 69952->69955 69956 7ff64b8b3680 RtlFreeHeap 69953->69956 69959 7ff64b8b3680 RtlFreeHeap 69954->69959 69957 7ff64b8ca2f5 69955->69957 69958 7ff64b8ca224 69956->69958 69960 7ff64b8b4f50 51 API calls 69957->69960 69962 7ff64b8b11a0 51 API calls 69958->69962 69959->69958 69961 7ff64b8ca31f 69960->69961 69963 7ff64b8b3680 RtlFreeHeap 69961->69963 69964 7ff64b8ca46f 69962->69964 69965 7ff64b8ca32d 69963->69965 69966 7ff64b8f98a0 72 API calls 69964->69966 69967 7ff64b8b0450 49 API calls 69965->69967 69968 7ff64b8ca489 69966->69968 69969 7ff64b8ca350 69967->69969 69970 7ff64b8b0450 49 API calls 69968->69970 69971 7ff64b8f8e90 72 API calls 69969->69971 69972 7ff64b8ca4ac 69970->69972 69973 7ff64b8ca36d 69971->69973 69974 7ff64b8f8e90 72 API calls 69972->69974 69978 7ff64b8ba250 70 API calls 69973->69978 69975 7ff64b8ca4c9 69974->69975 69976 7ff64b8b0450 49 API calls 69975->69976 69977 7ff64b8ca516 69976->69977 69979 7ff64b8f8e90 72 API calls 69977->69979 69980 7ff64b8ca3a4 69978->69980 69981 7ff64b8ca533 69979->69981 69982 7ff64b8b3680 RtlFreeHeap 69980->69982 69984 7ff64b8ba250 70 API calls 69981->69984 69983 7ff64b8ca3b2 69982->69983 69985 7ff64b8b11a0 51 API calls 69983->69985 69986 7ff64b8ca57a 69984->69986 69987 7ff64b8ca3dd 69985->69987 69988 7ff64b8b3680 RtlFreeHeap 69986->69988 69989 7ff64b8f98a0 72 API calls 69987->69989 69990 7ff64b8ca588 69988->69990 69991 7ff64b8ca3fa 69989->69991 69992 7ff64b8b3680 RtlFreeHeap 69990->69992 69993 7ff64b8b4f50 51 API calls 69991->69993 69994 7ff64b8ca596 69992->69994 69995 7ff64b8ca424 69993->69995 69996 7ff64b8b0510 68 API calls 69994->69996 69997 7ff64b8b3680 RtlFreeHeap 69995->69997 69998 7ff64b8ca5a8 69996->69998 69999 7ff64b8ca432 69997->69999 70000 7ff64b8b0510 68 API calls 69998->70000 70001 7ff64b8b3680 RtlFreeHeap 69999->70001 70002 7ff64b8ca5ba 70000->70002 70001->69958 70003 7ff64b8b0450 49 API calls 70002->70003 70004 7ff64b8ca5dd 70003->70004 70005 7ff64b8f8e90 72 API calls 70004->70005 70006 7ff64b8ca5fa 70005->70006 70007 7ff64b8b0450 49 API calls 70006->70007 70008 7ff64b8ca644 70007->70008 70009 7ff64b8f8e90 72 API calls 70008->70009 70010 7ff64b8ca661 70009->70010 70011 7ff64b93ca30 77 API calls 70010->70011 70012 7ff64b8ca6b2 70011->70012 70013 7ff64b8b3680 RtlFreeHeap 70012->70013 70014 7ff64b8ca6c0 70013->70014 70015 7ff64b8b3680 RtlFreeHeap 70014->70015 70016 7ff64b8ca6ce 70015->70016 70017 7ff64b8b3680 RtlFreeHeap 70016->70017 70018 7ff64b8ca6d9 70017->70018 70019 7ff64b8b3680 RtlFreeHeap 70018->70019 70020 7ff64b8ca6e4 70019->70020 70021 7ff64b8b3680 RtlFreeHeap 70020->70021 70022 7ff64b8ca6ef 70021->70022 70023 7ff64b8b3680 RtlFreeHeap 70022->70023 70024 7ff64b8ca6fa 70023->70024 70025 7ff64b8b3680 RtlFreeHeap 70024->70025 70026 7ff64b8ca705 70025->70026 70027 7ff64b8b3680 RtlFreeHeap 70026->70027 70028 7ff64b8ca710 70027->70028 70029 7ff64b8b3680 RtlFreeHeap 70028->70029 70029->70030 70030->69465 70032 7ff64b8b05d0 59 API calls 70031->70032 70033 7ff64b91a6ce 70032->70033 71175 7ff64b8ba530 70033->71175 70036 7ff64b91a796 70038 7ff64b8b0450 49 API calls 70036->70038 70037 7ff64b91a70b 70039 7ff64b8b11a0 51 API calls 70037->70039 70040 7ff64b91a7a8 70038->70040 70041 7ff64b91a726 70039->70041 70042 7ff64b8b3680 RtlFreeHeap 70040->70042 70043 7ff64b8f98a0 72 API calls 70041->70043 70052 7ff64b91a78b 70042->70052 70044 7ff64b91a73a 70043->70044 70045 7ff64b8b0450 49 API calls 70044->70045 70046 7ff64b91a754 70045->70046 70047 7ff64b8f8e90 72 API calls 70046->70047 70048 7ff64b91a76b 70047->70048 70049 7ff64b8b3680 RtlFreeHeap 70048->70049 70050 7ff64b91a780 70049->70050 70051 7ff64b8b3680 RtlFreeHeap 70050->70051 70051->70052 70052->69502 70054 7ff64b8a8aed 70053->70054 71195 7ff64b8aec10 70054->71195 70056 7ff64b8a8b15 70057 7ff64b8c48d0 70056->70057 70058 7ff64b8c48e5 70057->70058 70059 7ff64b8c48f6 70058->70059 71205 7ff64baa1c68 51 API calls 70058->71205 71204 7ff64baa19c0 CloseHandle 70059->71204 70062 7ff64b8c4915 70063 7ff64b8bc705 70062->70063 71206 7ff64baa1c68 51 API calls 70062->71206 70065 7ff64b8b8790 70063->70065 70066 7ff64b8b11a0 51 API calls 70065->70066 70067 7ff64b8b87c0 70066->70067 70068 7ff64b8f98a0 72 API calls 70067->70068 70069 7ff64b8b87dd 70068->70069 70070 7ff64b8b11a0 51 API calls 70069->70070 70071 7ff64b8b8812 70070->70071 70072 7ff64b8b3680 RtlFreeHeap 70071->70072 70073 7ff64b8b8820 70072->70073 70074 7ff64b8b11a0 51 API calls 70073->70074 70075 7ff64b8b8845 70074->70075 70076 7ff64b8f98a0 72 API calls 70075->70076 70077 7ff64b8b8862 70076->70077 70078 7ff64b8b11a0 51 API calls 70077->70078 70079 7ff64b8b8897 70078->70079 70080 7ff64b8b3680 RtlFreeHeap 70079->70080 70081 7ff64b8b88a5 70080->70081 70082 7ff64b8b11a0 51 API calls 70081->70082 70083 7ff64b8b88ca 70082->70083 70084 7ff64b8f98a0 72 API calls 70083->70084 70085 7ff64b8b88e7 70084->70085 70086 7ff64b8b11a0 51 API calls 70085->70086 70087 7ff64b8b891c 70086->70087 70088 7ff64b8b3680 RtlFreeHeap 70087->70088 70089 7ff64b8b892a 70088->70089 70090 7ff64b8b11a0 51 API calls 70089->70090 70091 7ff64b8b894f 70090->70091 70092 7ff64b8f98a0 72 API calls 70091->70092 70093 7ff64b8b896c 70092->70093 70094 7ff64b8b11a0 51 API calls 70093->70094 70095 7ff64b8b89a1 70094->70095 70096 7ff64b8b3680 RtlFreeHeap 70095->70096 70097 7ff64b8b89af 70096->70097 70098 7ff64b8b05d0 59 API calls 70097->70098 70099 7ff64b8b89ba 70098->70099 70100 7ff64b95b750 100 API calls 70099->70100 70101 7ff64b8b89c0 70100->70101 70102 7ff64b8b89c9 70101->70102 70103 7ff64b8b8bdb 70101->70103 70105 7ff64b8b11a0 51 API calls 70102->70105 71207 7ff64b92e480 GetModuleFileNameW 70103->71207 70107 7ff64b8b89ed 70105->70107 70110 7ff64b8f98a0 72 API calls 70107->70110 70113 7ff64b8b8a0a 70110->70113 70116 7ff64b8b0510 68 API calls 70113->70116 71176 7ff64b8ba543 71175->71176 71178 7ff64b8ba56b GetUserDefaultUILanguage LCIDToLocaleName 71176->71178 71179 7ff64b8ba140 71176->71179 71178->70036 71178->70037 71180 7ff64b8ba157 71179->71180 71189 7ff64b8b7d90 71180->71189 71183 7ff64b8ba1b8 71184 7ff64b8d0d40 47 API calls 71183->71184 71185 7ff64b8ba222 71184->71185 71186 7ff64b8bada0 RtlFreeHeap 71185->71186 71187 7ff64b8ba238 71186->71187 71187->71178 71190 7ff64b8b7da2 71189->71190 71191 7ff64b8b7dca 71190->71191 71194 7ff64b8b7f00 HeapAlloc 71190->71194 71191->71183 71193 7ff64b8bea20 RtlPcToFileHeader RaiseException 71191->71193 71193->71183 71194->71191 71196 7ff64b8aec30 71195->71196 71197 7ff64b8afc90 4 API calls 71196->71197 71198 7ff64b8aec58 71197->71198 71199 7ff64bacfc38 52 API calls 71198->71199 71200 7ff64b8aeca0 71199->71200 71202 7ff64b8aecb3 71200->71202 71203 7ff64baa1c68 51 API calls 71200->71203 71202->70056 71203->71202 71204->70062 71205->70059 71206->70063 71208 7ff64b92e49e 71207->71208 71230 7ff64bad611c 71208->71230 71231 7ff64bad6152 71230->71231 71232 7ff64bad6171 SetCurrentDirectoryW 71230->71232 71255 7ff64bac90d0 11 API calls 71231->71255 71234 7ff64bad618a 71232->71234 71235 7ff64bad617b GetLastError 71232->71235 73035 7ff64b8b97d0 73036 7ff64b8b11a0 51 API calls 73035->73036 73037 7ff64b8b980e 73036->73037 73038 7ff64b8f98a0 72 API calls 73037->73038 73039 7ff64b8b9825 73038->73039 73040 7ff64b8b11a0 51 API calls 73039->73040 73041 7ff64b8b985a 73040->73041 73042 7ff64b8b3680 RtlFreeHeap 73041->73042 73043 7ff64b8b9868 73042->73043 73044 7ff64b8b11a0 51 API calls 73043->73044 73045 7ff64b8b988d 73044->73045 73046 7ff64b8f98a0 72 API calls 73045->73046 73047 7ff64b8b98aa 73046->73047 73048 7ff64b8b11a0 51 API calls 73047->73048 73049 7ff64b8b98dc 73048->73049 73050 7ff64b8b3680 RtlFreeHeap 73049->73050 73051 7ff64b8b98ea 73050->73051 73052 7ff64b8b11a0 51 API calls 73051->73052 73053 7ff64b8b990f 73052->73053 73054 7ff64b8f98a0 72 API calls 73053->73054 73055 7ff64b8b992c 73054->73055 73056 7ff64b8b11a0 51 API calls 73055->73056 73057 7ff64b8b9961 73056->73057 73058 7ff64b8b3680 RtlFreeHeap 73057->73058 73059 7ff64b8b996f 73058->73059 73060 7ff64b8b11a0 51 API calls 73059->73060 73061 7ff64b8b9994 73060->73061 73062 7ff64b8f98a0 72 API calls 73061->73062 73063 7ff64b8b99b1 73062->73063 73064 7ff64b8b11a0 51 API calls 73063->73064 73065 7ff64b8b99e6 73064->73065 73066 7ff64b8b3680 RtlFreeHeap 73065->73066 73067 7ff64b8b99f4 73066->73067 73068 7ff64b8b11a0 51 API calls 73067->73068 73069 7ff64b8b9a19 73068->73069 73070 7ff64b8f98a0 72 API calls 73069->73070 73071 7ff64b8b9a36 73070->73071 73072 7ff64b8b11a0 51 API calls 73071->73072 73073 7ff64b8b9a6b 73072->73073 73074 7ff64b8b3680 RtlFreeHeap 73073->73074 73075 7ff64b8b9a79 GetClassNameW 73074->73075 73076 7ff64b8b9b59 73075->73076 73077 7ff64b8b9ae7 GetWindowTextW 73075->73077 73078 7ff64b8b10b0 51 API calls 73076->73078 73077->73076 73079 7ff64b8b9b06 73077->73079 73087 7ff64b8b9b7e 73078->73087 73080 7ff64b8b3c10 47 API calls 73079->73080 73081 7ff64b8b9b1b 73080->73081 73082 7ff64b8b3c10 47 API calls 73081->73082 73083 7ff64b8b9b29 73082->73083 73084 7ff64b8b3c10 47 API calls 73083->73084 73085 7ff64b8b9b37 73084->73085 73086 7ff64b8b3c10 47 API calls 73085->73086 73088 7ff64b8b9b42 73086->73088 73090 7ff64b8b3680 RtlFreeHeap 73087->73090 73089 7ff64b8b3c10 47 API calls 73088->73089 73121 7ff64b8b9b50 73089->73121 73091 7ff64b8b9bec 73090->73091 73092 7ff64b8b9bf9 EnumChildWindows EnumChildWindows EnumChildWindows 73091->73092 73093 7ff64b8b9cad 73091->73093 73094 7ff64b8b3c10 47 API calls 73092->73094 73095 7ff64b8b10b0 51 API calls 73093->73095 73105 7ff64b8b9cde 73093->73105 73096 7ff64b8b9c6f 73094->73096 73095->73105 73097 7ff64b8b3c10 47 API calls 73096->73097 73098 7ff64b8b9c7d 73097->73098 73100 7ff64b8b3c10 47 API calls 73098->73100 73099 7ff64b8b9e0d 73102 7ff64b8b9e2b 73099->73102 73107 7ff64b8b3680 RtlFreeHeap 73099->73107 73106 7ff64b8b9c8b 73100->73106 73101 7ff64b8b3680 RtlFreeHeap 73101->73099 73103 7ff64b8b9e35 73102->73103 73104 7ff64b8b9e97 73102->73104 73110 7ff64b8b3c10 47 API calls 73103->73110 73113 7ff64b8b9ecb 73104->73113 73115 7ff64b8b10b0 51 API calls 73104->73115 73108 7ff64b8b10b0 51 API calls 73105->73108 73109 7ff64b8b9d84 73105->73109 73111 7ff64b8b3c10 47 API calls 73106->73111 73107->73102 73108->73109 73109->73099 73109->73101 73112 7ff64b8b9e59 73110->73112 73114 7ff64b8b9c96 73111->73114 73116 7ff64b8b3c10 47 API calls 73112->73116 73119 7ff64b8b3680 RtlFreeHeap 73113->73119 73124 7ff64b8b9f54 73113->73124 73117 7ff64b8b3c10 47 API calls 73114->73117 73115->73113 73118 7ff64b8b9e67 73116->73118 73117->73121 73122 7ff64b8b3c10 47 API calls 73118->73122 73119->73124 73120 7ff64b8b9f5e 73125 7ff64b8b3c10 47 API calls 73120->73125 73127 7ff64b8b9e75 73122->73127 73123 7ff64b8b9fc0 73128 7ff64b8b10b0 51 API calls 73123->73128 73144 7ff64b8b9ff4 73123->73144 73124->73120 73124->73123 73126 7ff64b8b9f82 73125->73126 73129 7ff64b8b3c10 47 API calls 73126->73129 73131 7ff64b8b3c10 47 API calls 73127->73131 73128->73144 73132 7ff64b8b9f90 73129->73132 73130 7ff64b8ba07d 73134 7ff64b8ba087 73130->73134 73135 7ff64b8ba0e6 73130->73135 73136 7ff64b8b9e80 73131->73136 73137 7ff64b8b3c10 47 API calls 73132->73137 73133 7ff64b8b3680 RtlFreeHeap 73133->73130 73139 7ff64b8b3c10 47 API calls 73134->73139 73138 7ff64b8b3c10 47 API calls 73135->73138 73140 7ff64b8b3c10 47 API calls 73136->73140 73141 7ff64b8b9f9e 73137->73141 73142 7ff64b8ba0fb 73138->73142 73143 7ff64b8ba0ab 73139->73143 73140->73121 73145 7ff64b8b3c10 47 API calls 73141->73145 73146 7ff64b8b3c10 47 API calls 73142->73146 73147 7ff64b8b3c10 47 API calls 73143->73147 73144->73130 73144->73133 73148 7ff64b8b9fa9 73145->73148 73149 7ff64b8ba109 73146->73149 73150 7ff64b8ba0b9 73147->73150 73151 7ff64b8b3c10 47 API calls 73148->73151 73152 7ff64b8b3c10 47 API calls 73149->73152 73153 7ff64b8b3c10 47 API calls 73150->73153 73151->73121 73155 7ff64b8ba117 73152->73155 73154 7ff64b8ba0c7 73153->73154 73156 7ff64b8b3c10 47 API calls 73154->73156 73157 7ff64b8b3c10 47 API calls 73155->73157 73158 7ff64b8ba0d2 73156->73158 73159 7ff64b8ba122 73157->73159 73160 7ff64b8b3c10 47 API calls 73158->73160 73161 7ff64b8b3c10 47 API calls 73159->73161 73160->73121 73161->73121 73162 7ff64b8a1270 73163 7ff64b8b11a0 51 API calls 73162->73163 73164 7ff64b8a128f 73163->73164 73165 7ff64b8f98a0 72 API calls 73164->73165 73166 7ff64b8a12a3 73165->73166 73167 7ff64b8b11a0 51 API calls 73166->73167 73168 7ff64b8a12cb 73167->73168 73169 7ff64b8b3680 RtlFreeHeap 73168->73169 73170 7ff64b8a12d6 73169->73170 73173 7ff64bac2e3c 73170->73173 73176 7ff64bac2e00 73173->73176 73175 7ff64b8a12e3 73177 7ff64bac2e1a 73176->73177 73179 7ff64bac2e13 73176->73179 73180 7ff64bae0438 73177->73180 73179->73175 73183 7ff64bae0074 73180->73183 73190 7ff64bada724 EnterCriticalSection 73183->73190 73191 7ff64b9042b0 73194 7ff64bad689c 73191->73194 73195 7ff64bad68d6 73194->73195 73196 7ff64bad68b8 73194->73196 73215 7ff64bad6450 EnterCriticalSection 73195->73215 73216 7ff64bac90f0 11 API calls 73196->73216 73200 7ff64bad68bd 73217 7ff64bac8f84 47 API calls 73200->73217 73213 7ff64b9042c8 73216->73200 73217->73213 73218 7ff64b8e51f0 73221 7ff64b8e4ef0 73218->73221 73220 7ff64b8e51fc 73224 7ff64b8e4e70 73221->73224 73223 7ff64b8e4f0d 73223->73220 73225 7ff64b8e4e96 73224->73225 73230 7ff64b8b2c70 73225->73230 73229 7ff64b8e4ecd 73229->73223 73231 7ff64baa13e8 6 API calls 73230->73231 73232 7ff64b8b2c94 73231->73232 73233 7ff64b8b2d09 73232->73233 73234 7ff64b8b2d1b 73232->73234 73241 7ff64baa200c 73233->73241 73245 7ff64baa18e0 51 API calls 73234->73245 73237 7ff64b8b2d18 73238 7ff64b8e73c0 73237->73238 73251 7ff64b8c0020 73238->73251 73242 7ff64baa2025 73241->73242 73246 7ff64b8e5a10 73242->73246 73244 7ff64baa203f 73245->73237 73247 7ff64b8e5a31 73246->73247 73249 7ff64b8e5a3b 73246->73249 73250 7ff64b8c2360 13 API calls 73247->73250 73249->73244 73250->73249 73254 7ff64baa2390 73251->73254 73255 7ff64badab18 47 API calls 73254->73255 73256 7ff64baa23b5 73255->73256 73263 7ff64badabac 73256->73263 73262 7ff64b8c003a 73262->73229 73264 7ff64bae09fc 47 API calls 73263->73264 73265 7ff64badabb5 73264->73265 73266 7ff64bae0e70 47 API calls 73265->73266 73267 7ff64baa23bc 73266->73267 73268 7ff64badab78 73267->73268 73269 7ff64bae09fc 47 API calls 73268->73269 73270 7ff64badab81 73269->73270 73271 7ff64bae0e70 47 API calls 73270->73271 73272 7ff64baa23c4 73271->73272 73272->73262 73273 7ff64badaae8 47 API calls 73272->73273 73273->73262 73274 7ff64baebbcc GetEnvironmentStringsW 73275 7ff64baebc53 73274->73275 73277 7ff64baebbf0 73274->73277 73276 7ff64bae0e10 12 API calls 73278 7ff64baebc27 73276->73278 73277->73276 73279 7ff64bae0dd4 11 API calls 73278->73279 73280 7ff64baebc47 FreeEnvironmentStringsW 73279->73280 73280->73275 73281 7ff64b9325a0 73299 7ff64b8ad210 73281->73299 73283 7ff64b9325c1 RegCreateKeyW 73284 7ff64b9325dc 73283->73284 73285 7ff64b93267e 73283->73285 73288 7ff64b9325e6 RegSetValueExW 73284->73288 73286 7ff64b8b3680 RtlFreeHeap 73285->73286 73287 7ff64b93268d 73286->73287 73289 7ff64b8b3680 RtlFreeHeap 73287->73289 73290 7ff64b932624 RegCloseKey 73288->73290 73291 7ff64b932652 RegCloseKey 73288->73291 73298 7ff64b932649 73289->73298 73292 7ff64b8b3680 RtlFreeHeap 73290->73292 73293 7ff64b8b3680 RtlFreeHeap 73291->73293 73294 7ff64b93263f 73292->73294 73295 7ff64b93266d 73293->73295 73296 7ff64b8b3680 RtlFreeHeap 73294->73296 73297 7ff64b8b3680 RtlFreeHeap 73295->73297 73296->73298 73297->73298 73299->73283 73300 7ff64b90ee00 73303 7ff64b918c10 CoUninitialize 73300->73303 73302 7ff64b90ee13 73303->73302 73304 7ff64b8b74c0 73307 7ff64b8b3c80 73304->73307 73306 7ff64b8b74d7 73308 7ff64b8b3ca3 73307->73308 73311 7ff64b8b3cb1 73307->73311 73309 7ff64bac9ad0 13 API calls 73308->73309 73309->73311 73310 7ff64bac9ad0 13 API calls 73312 7ff64b8b3cc0 73310->73312 73311->73310 73312->73306 73313 7ff64b8be340 73314 7ff64b8be395 73313->73314 73315 7ff64b8be36c 73313->73315 73317 7ff64b8be425 73314->73317 73318 7ff64b8be390 73314->73318 73316 7ff64b8be3b6 73315->73316 73323 7ff64b8be389 73315->73323 73324 7ff64b8be9ba PostQuitMessage 73315->73324 73319 7ff64b8be9ec DefWindowProcW 73316->73319 73320 7ff64b8be434 73317->73320 73321 7ff64b8be6dd 73317->73321 73318->73316 73326 7ff64b8be9c5 DefWindowProcW 73318->73326 73325 7ff64b8be414 73319->73325 73322 7ff64b8b11a0 51 API calls 73320->73322 73321->73316 73327 7ff64b8b11a0 51 API calls 73321->73327 73328 7ff64b8be458 73322->73328 73323->73318 73329 7ff64b8be3bb 73323->73329 73324->73319 73326->73319 73326->73325 73330 7ff64b8be710 73327->73330 73331 7ff64b8f98a0 72 API calls 73328->73331 73332 7ff64b8be3ef 73329->73332 73333 7ff64b8be3d3 PostMessageW 73329->73333 73334 7ff64b8f98a0 72 API calls 73330->73334 73335 7ff64b8be472 73331->73335 73332->73325 73336 7ff64b8be3fa PostMessageW 73332->73336 73333->73325 73337 7ff64b8be72d 73334->73337 73338 7ff64b8b11a0 51 API calls 73335->73338 73336->73325 73339 7ff64b8b11a0 51 API calls 73337->73339 73340 7ff64b8be497 73338->73340 73341 7ff64b8be752 73339->73341 73342 7ff64b8f98a0 72 API calls 73340->73342 73343 7ff64b8f98a0 72 API calls 73341->73343 73344 7ff64b8be4b1 73342->73344 73345 7ff64b8be76c 73343->73345 73346 7ff64b8b11a0 51 API calls 73344->73346 73347 7ff64b8b11a0 51 API calls 73345->73347 73348 7ff64b8be4d6 73346->73348 73349 7ff64b8be791 73347->73349 73350 7ff64b8f98a0 72 API calls 73348->73350 73351 7ff64b8f98a0 72 API calls 73349->73351 73352 7ff64b8be4f0 73350->73352 73354 7ff64b8be7ab 73351->73354 73353 7ff64b8b0510 68 API calls 73352->73353 73356 7ff64b8be502 73353->73356 73355 7ff64b8b0510 68 API calls 73354->73355 73357 7ff64b8be7bd 73355->73357 73358 7ff64b8b0510 68 API calls 73356->73358 73359 7ff64b8b0510 68 API calls 73357->73359 73360 7ff64b8be514 73358->73360 73361 7ff64b8be7cf 73359->73361 73362 7ff64b8b0450 49 API calls 73360->73362 73363 7ff64b8b0450 49 API calls 73361->73363 73364 7ff64b8be537 73362->73364 73365 7ff64b8be7f2 73363->73365 73366 7ff64b8f8e90 72 API calls 73364->73366 73367 7ff64b8f8e90 72 API calls 73365->73367 73368 7ff64b8be554 73366->73368 73369 7ff64b8be80f 73367->73369 73370 7ff64b8b0450 49 API calls 73368->73370 73371 7ff64b8b0450 49 API calls 73369->73371 73372 7ff64b8be59e 73370->73372 73373 7ff64b8be859 73371->73373 73374 7ff64b8f8e90 72 API calls 73372->73374 73375 7ff64b8f8e90 72 API calls 73373->73375 73376 7ff64b8be5bb 73374->73376 73377 7ff64b8be876 73375->73377 73378 7ff64b8b0450 49 API calls 73376->73378 73379 7ff64b8b0450 49 API calls 73377->73379 73380 7ff64b8be605 73378->73380 73381 7ff64b8be8c3 73379->73381 73382 7ff64b8f8e90 72 API calls 73380->73382 73383 7ff64b8f8e90 72 API calls 73381->73383 73384 7ff64b8be622 73382->73384 73386 7ff64b8be8e0 73383->73386 73420 7ff64b93d350 90 API calls 73384->73420 73421 7ff64b93d350 90 API calls 73386->73421 73388 7ff64b8be676 73390 7ff64b8b3680 RtlFreeHeap 73388->73390 73389 7ff64b8be934 73391 7ff64b8b3680 RtlFreeHeap 73389->73391 73392 7ff64b8be684 73390->73392 73393 7ff64b8be942 73391->73393 73394 7ff64b8b3680 RtlFreeHeap 73392->73394 73395 7ff64b8b3680 RtlFreeHeap 73393->73395 73396 7ff64b8be692 73394->73396 73397 7ff64b8be950 73395->73397 73398 7ff64b8b3680 RtlFreeHeap 73396->73398 73399 7ff64b8b3680 RtlFreeHeap 73397->73399 73400 7ff64b8be6a0 73398->73400 73401 7ff64b8be95e 73399->73401 73402 7ff64b8b3680 RtlFreeHeap 73400->73402 73403 7ff64b8b3680 RtlFreeHeap 73401->73403 73404 7ff64b8be6ab 73402->73404 73405 7ff64b8be969 73403->73405 73406 7ff64b8b3680 RtlFreeHeap 73404->73406 73407 7ff64b8b3680 RtlFreeHeap 73405->73407 73408 7ff64b8be6b6 73406->73408 73409 7ff64b8be974 73407->73409 73410 7ff64b8b3680 RtlFreeHeap 73408->73410 73411 7ff64b8b3680 RtlFreeHeap 73409->73411 73412 7ff64b8be6c1 73410->73412 73413 7ff64b8be97f 73411->73413 73414 7ff64b8b3680 RtlFreeHeap 73412->73414 73415 7ff64b8b3680 RtlFreeHeap 73413->73415 73416 7ff64b8be6cc 73414->73416 73418 7ff64b8be98a 73415->73418 73417 7ff64b8b3680 RtlFreeHeap 73416->73417 73417->73316 73419 7ff64b8b3680 RtlFreeHeap 73418->73419 73419->73316 73420->73388 73421->73389 73422 7ff64b8a1080 73427 7ff64ba85a90 73422->73427 73428 7ff64b8b11a0 51 API calls 73427->73428 73429 7ff64ba85aca 73428->73429 73430 7ff64b8f98a0 72 API calls 73429->73430 73431 7ff64ba85ae7 73430->73431 73432 7ff64b8b11a0 51 API calls 73431->73432 73433 7ff64ba85b0c 73432->73433 73434 7ff64b8f98a0 72 API calls 73433->73434 73435 7ff64ba85b29 73434->73435 73436 7ff64b8b11a0 51 API calls 73435->73436 73437 7ff64ba85b4e 73436->73437 73438 7ff64b8f98a0 72 API calls 73437->73438 73439 7ff64ba85b6b 73438->73439 73440 7ff64b8b11a0 51 API calls 73439->73440 73441 7ff64ba85b90 73440->73441 73442 7ff64b8f98a0 72 API calls 73441->73442 73443 7ff64ba85bad 73442->73443 73444 7ff64b8b11a0 51 API calls 73443->73444 73445 7ff64ba85bd2 73444->73445 73446 7ff64b8f98a0 72 API calls 73445->73446 73447 7ff64ba85bef 73446->73447 73448 7ff64b8b11a0 51 API calls 73447->73448 73449 7ff64ba85c14 73448->73449 73450 7ff64b8f98a0 72 API calls 73449->73450 73451 7ff64ba85c31 73450->73451 73452 7ff64b8b11a0 51 API calls 73451->73452 73453 7ff64ba85c56 73452->73453 73454 7ff64b8f98a0 72 API calls 73453->73454 73455 7ff64ba85c73 73454->73455 73456 7ff64b8b11a0 51 API calls 73455->73456 73457 7ff64ba85c98 73456->73457 73458 7ff64b8f98a0 72 API calls 73457->73458 73459 7ff64ba85cb5 73458->73459 73460 7ff64b8b11a0 51 API calls 73459->73460 73461 7ff64ba85cda 73460->73461 73462 7ff64b8f98a0 72 API calls 73461->73462 73463 7ff64ba85cf7 73462->73463 73464 7ff64b8b11a0 51 API calls 73463->73464 73465 7ff64ba85d1c 73464->73465 73466 7ff64b8f98a0 72 API calls 73465->73466 73467 7ff64ba85d39 73466->73467 73468 7ff64b8b11a0 51 API calls 73467->73468 73469 7ff64ba85d5e 73468->73469 73470 7ff64b8f98a0 72 API calls 73469->73470 73471 7ff64ba85d7b 73470->73471 73472 7ff64b8b11a0 51 API calls 73471->73472 73473 7ff64ba85da0 73472->73473 73474 7ff64b8f98a0 72 API calls 73473->73474 73475 7ff64ba85dbd 73474->73475 73476 7ff64b8b11a0 51 API calls 73475->73476 73477 7ff64ba85de2 73476->73477 73478 7ff64b8f98a0 72 API calls 73477->73478 73479 7ff64ba85dfc 73478->73479 73480 7ff64b8b11a0 51 API calls 73479->73480 73481 7ff64ba85e21 73480->73481 73482 7ff64b8f98a0 72 API calls 73481->73482 73483 7ff64ba85e3b 73482->73483 73484 7ff64b8b11a0 51 API calls 73483->73484 73485 7ff64ba85e60 73484->73485 73486 7ff64b8f98a0 72 API calls 73485->73486 73487 7ff64ba85e7a 73486->73487 73488 7ff64b8b11a0 51 API calls 73487->73488 73489 7ff64ba85e9f 73488->73489 73490 7ff64b8f98a0 72 API calls 73489->73490 73491 7ff64ba85eb9 73490->73491 73492 7ff64b8b11a0 51 API calls 73491->73492 73493 7ff64ba85ede 73492->73493 73494 7ff64b8f98a0 72 API calls 73493->73494 73495 7ff64ba85ef8 73494->73495 73496 7ff64b8b11a0 51 API calls 73495->73496 73497 7ff64ba85f1d 73496->73497 73498 7ff64b8f98a0 72 API calls 73497->73498 73499 7ff64ba85f37 73498->73499 73500 7ff64b8b11a0 51 API calls 73499->73500 73501 7ff64ba85f5c 73500->73501 73502 7ff64b8f98a0 72 API calls 73501->73502 73503 7ff64ba85f76 73502->73503 73504 7ff64b8b11a0 51 API calls 73503->73504 73505 7ff64ba85f9b 73504->73505 73506 7ff64b8f98a0 72 API calls 73505->73506 73507 7ff64ba85fb5 73506->73507 73508 7ff64b8b11a0 51 API calls 73507->73508 73509 7ff64ba85fda 73508->73509 73510 7ff64b8f98a0 72 API calls 73509->73510 73511 7ff64ba85ff4 73510->73511 73512 7ff64b8b11a0 51 API calls 73511->73512 73513 7ff64ba86019 73512->73513 73514 7ff64b8f98a0 72 API calls 73513->73514 73515 7ff64ba86033 73514->73515 73516 7ff64b8b11a0 51 API calls 73515->73516 73517 7ff64ba86058 73516->73517 73518 7ff64b8f98a0 72 API calls 73517->73518 73519 7ff64ba86072 73518->73519 73520 7ff64b8b0450 49 API calls 73519->73520 73521 7ff64ba8609a 73520->73521 73522 7ff64b8b0450 49 API calls 73521->73522 73523 7ff64ba860b0 73522->73523 73524 7ff64b8b0450 49 API calls 73523->73524 73525 7ff64ba860c6 73524->73525 73526 7ff64b8b0450 49 API calls 73525->73526 73527 7ff64ba860dc 73526->73527 73528 7ff64b8b0450 49 API calls 73527->73528 73529 7ff64ba860f2 73528->73529 73530 7ff64b8b0450 49 API calls 73529->73530 73531 7ff64ba86108 73530->73531 73532 7ff64b8b0450 49 API calls 73531->73532 73533 7ff64ba8611e 73532->73533 73534 7ff64b8b0450 49 API calls 73533->73534 73535 7ff64ba86134 73534->73535 73536 7ff64b8b0450 49 API calls 73535->73536 73537 7ff64ba8614a 73536->73537 73538 7ff64b8b0450 49 API calls 73537->73538 73539 7ff64ba86160 73538->73539 73540 7ff64b8b0450 49 API calls 73539->73540 73541 7ff64ba86176 73540->73541 73542 7ff64b8b0450 49 API calls 73541->73542 73543 7ff64ba8618c 73542->73543 73544 7ff64b8b0450 49 API calls 73543->73544 73545 7ff64ba8619f 73544->73545 73546 7ff64b8b0450 49 API calls 73545->73546 73547 7ff64ba861b2 73546->73547 73548 7ff64b8b0450 49 API calls 73547->73548 73549 7ff64ba861c5 73548->73549 73550 7ff64b8b0450 49 API calls 73549->73550 73551 7ff64ba861d8 73550->73551 73552 7ff64b8b0450 49 API calls 73551->73552 73553 7ff64ba861eb 73552->73553 73554 7ff64b8b0450 49 API calls 73553->73554 73555 7ff64ba861fe 73554->73555 73556 7ff64b8b0450 49 API calls 73555->73556 73557 7ff64ba86211 73556->73557 73558 7ff64b8b0450 49 API calls 73557->73558 73559 7ff64ba86224 73558->73559 73560 7ff64b8b0450 49 API calls 73559->73560 73561 7ff64ba86237 73560->73561 73562 7ff64b8b0450 49 API calls 73561->73562 73563 7ff64ba8624a 73562->73563 73564 7ff64b8b0450 49 API calls 73563->73564 73618 7ff64b8fb0c0 73619 7ff64b8fb0d8 73618->73619 73627 7ff64b8fb0df 73618->73627 73620 7ff64b8fb1d7 WaitForSingleObject 73620->73619 73620->73627 73622 7ff64b8f7740 ReleaseSRWLockExclusive 73622->73627 73624 7ff64b8f7690 57 API calls 73624->73627 73625 7ff64b8fadc0 RtlFreeHeap 73625->73627 73627->73620 73627->73622 73627->73624 73627->73625 73628 7ff64b8fab80 73627->73628 73641 7ff64b8fbe70 73627->73641 73669 7ff64b8fbc60 RtlFreeHeap 73627->73669 73629 7ff64b8b0450 49 API calls 73628->73629 73630 7ff64b8fabaa 73629->73630 73631 7ff64b8b0450 49 API calls 73630->73631 73632 7ff64b8fabcf 73631->73632 73633 7ff64b8b0450 49 API calls 73632->73633 73634 7ff64b8fabf4 73633->73634 73635 7ff64b8b0450 49 API calls 73634->73635 73636 7ff64b8fac19 73635->73636 73637 7ff64b8b0450 49 API calls 73636->73637 73638 7ff64b8fac3e 73637->73638 73639 7ff64b8b0450 49 API calls 73638->73639 73640 7ff64b8fac63 73639->73640 73640->73627 73642 7ff64b8fbf50 73641->73642 73643 7ff64b8fbeb1 73641->73643 73642->73627 73644 7ff64b8fbf0c WinHttpConnect 73643->73644 73645 7ff64b8fbf57 73644->73645 73645->73642 73646 7ff64b8b05d0 59 API calls 73645->73646 73647 7ff64b8fbf6d GetTickCount64 73646->73647 73648 7ff64b8fc2b6 73647->73648 73649 7ff64b8ba250 70 API calls 73648->73649 73650 7ff64b8fc387 73649->73650 73651 7ff64b8fc392 WinHttpOpenRequest 73650->73651 73652 7ff64b8fc3d1 WinHttpSetTimeouts 73651->73652 73653 7ff64b8fc43c 73651->73653 73652->73653 73654 7ff64b8fc3f9 73652->73654 73655 7ff64b8b3680 RtlFreeHeap 73653->73655 73657 7ff64b8fc401 WinHttpCloseHandle 73654->73657 73658 7ff64b8fc40d 73654->73658 73656 7ff64b8fc446 73655->73656 73661 7ff64b8fc485 73656->73661 73662 7ff64b8fc455 WinHttpSendRequest 73656->73662 73657->73658 73659 7ff64b8fc415 WinHttpCloseHandle 73658->73659 73660 7ff64b8fc421 73658->73660 73659->73660 73663 7ff64b8b3680 RtlFreeHeap 73660->73663 73664 7ff64b8fc49d 73661->73664 73665 7ff64b8fc48c WinHttpReceiveResponse 73661->73665 73662->73661 73663->73642 73666 7ff64b8fc4a5 WinHttpCloseHandle 73664->73666 73667 7ff64b8fc4b1 73664->73667 73665->73664 73666->73667 73667->73642 73668 7ff64b8fc4b9 WinHttpCloseHandle 73667->73668 73668->73642 73669->73627 73670 7ff64b8faf80 73671 7ff64b8b11a0 51 API calls 73670->73671 73672 7ff64b8fafaa 73671->73672 73673 7ff64b8f98a0 72 API calls 73672->73673 73674 7ff64b8fafbe 73673->73674 73675 7ff64b8b0450 49 API calls 73674->73675 73676 7ff64b8fafd8 73675->73676 73677 7ff64b8f8e90 72 API calls 73676->73677 73678 7ff64b8fafec 73677->73678 73679 7ff64b8faffb WinHttpOpen 73678->73679 73680 7ff64b8b3680 RtlFreeHeap 73679->73680 73681 7ff64b8fb02d 73680->73681 73682 7ff64b8fb040 73681->73682 73683 7ff64b8fb058 WinHttpSetTimeouts 73681->73683 73684 7ff64b8b3680 RtlFreeHeap 73682->73684 73685 7ff64b8fb0a2 73683->73685 73686 7ff64b8fb08a 73683->73686 73687 7ff64b8fb052 73684->73687 73689 7ff64b8b3680 RtlFreeHeap 73685->73689 73688 7ff64b8b3680 RtlFreeHeap 73686->73688 73688->73687 73689->73687 73690 7ff64b8e1e41 73691 7ff64b8e1e52 73690->73691 73697 7ff64b8e1eb1 73690->73697 73692 7ff64b8b5700 7 API calls 73691->73692 73693 7ff64b8e1e6c 73692->73693 73698 7ff64b8e6d70 73693->73698 73696 7ff64b8e5a10 13 API calls 73696->73697 73701 7ff64baa4e5c 73698->73701 73700 7ff64b8e1e85 73700->73696 73702 7ff64baa13e8 6 API calls 73701->73702 73703 7ff64baa4e85 73702->73703 73704 7ff64baa4f47 73703->73704 73708 7ff64baa4eb6 73703->73708 73706 7ff64baa1810 2 API calls 73704->73706 73705 7ff64baa1460 LeaveCriticalSection 73707 7ff64baa4f31 73705->73707 73709 7ff64baa4f4c 73706->73709 73707->73700 73708->73705 73710 7ff64b8b2c70 57 API calls 73709->73710 73711 7ff64baa4f82 73710->73711 73711->73700 73712 7ff64b8c9540 73713 7ff64b8b11a0 51 API calls 73712->73713 73714 7ff64b8c956a 73713->73714 73715 7ff64b8f98a0 72 API calls 73714->73715 73716 7ff64b8c957e 73715->73716 73717 7ff64b8b11a0 51 API calls 73716->73717 73718 7ff64b8c959d 73717->73718 73719 7ff64b8f98a0 72 API calls 73718->73719 73720 7ff64b8c95b1 73719->73720 73753 7ff64b9517a0 ShowWindow 73720->73753 73722 7ff64b8c95c6 73723 7ff64b8b0510 68 API calls 73722->73723 73724 7ff64b8c95d8 73723->73724 73725 7ff64b8b0510 68 API calls 73724->73725 73726 7ff64b8c95ea 73725->73726 73727 7ff64b8b0510 68 API calls 73726->73727 73728 7ff64b8c95fc 73727->73728 73729 7ff64b8b0450 49 API calls 73728->73729 73730 7ff64b8c9619 73729->73730 73731 7ff64b8f8e90 72 API calls 73730->73731 73732 7ff64b8c9636 73731->73732 73733 7ff64b8b0450 49 API calls 73732->73733 73734 7ff64b8c9680 73733->73734 73735 7ff64b8f8e90 72 API calls 73734->73735 73736 7ff64b8c969d 73735->73736 73737 7ff64b93ca30 77 API calls 73736->73737 73738 7ff64b8c96ee 73737->73738 73739 7ff64b8b3680 RtlFreeHeap 73738->73739 73740 7ff64b8c96fc 73739->73740 73741 7ff64b8b3680 RtlFreeHeap 73740->73741 73742 7ff64b8c970a 73741->73742 73743 7ff64b8b3680 RtlFreeHeap 73742->73743 73744 7ff64b8c9715 73743->73744 73745 7ff64b8b3680 RtlFreeHeap 73744->73745 73746 7ff64b8c9720 73745->73746 73747 7ff64b8b3680 RtlFreeHeap 73746->73747 73748 7ff64b8c972b 73747->73748 73749 7ff64b8b3680 RtlFreeHeap 73748->73749 73750 7ff64b8c9736 73749->73750 73751 7ff64b8b3680 RtlFreeHeap 73750->73751 73752 7ff64b8c9741 73751->73752 73754 7ff64b9517ca UpdateWindow 73753->73754 73755 7ff64b9517be 73753->73755 73754->73722 73755->73754 73756 7ff64b8e5c60 73759 7ff64b8e5980 73756->73759 73761 7ff64b8e5998 73759->73761 73760 7ff64b8e599f 73761->73760 73765 7ff64b8e82c0 73761->73765 73763 7ff64b8e59ce 73769 7ff64b8e2cb0 73763->73769 73766 7ff64b8e82d3 73765->73766 73773 7ff64b8ac010 73766->73773 73770 7ff64b8e2cc8 73769->73770 73779 7ff64b8e2dc0 73770->73779 73772 7ff64b8e2cfa 73772->73760 73776 7ff64b8ac023 73773->73776 73774 7ff64b8ac06a 73774->73763 73775 7ff64b8ac010 48 API calls 73775->73776 73776->73774 73776->73775 73778 7ff64b8ad020 48 API calls 73776->73778 73778->73776 73780 7ff64b8e2ddd 73779->73780 73781 7ff64b8e2e92 73780->73781 73787 7ff64b8e2ec0 73780->73787 73781->73772 73784 7ff64b8e2dc0 49 API calls 73785 7ff64b8e2e68 73784->73785 73786 7ff64b8e2dc0 49 API calls 73785->73786 73786->73781 73790 7ff64b8e2850 73787->73790 73791 7ff64b8e2868 73790->73791 73794 7ff64b8e28b0 73791->73794 73795 7ff64b8e28d2 73794->73795 73802 7ff64b8e6e10 73795->73802 73797 7ff64b8e28dd 73805 7ff64b8e3d20 73797->73805 73799 7ff64b8e2916 73809 7ff64b8e5470 73799->73809 73803 7ff64b8e80e0 49 API calls 73802->73803 73804 7ff64b8e6e42 73803->73804 73804->73797 73806 7ff64b8e3d42 73805->73806 73813 7ff64b8e5110 73806->73813 73810 7ff64b8e5485 73809->73810 73812 7ff64b8e28a2 73809->73812 73818 7ff64b8c4700 47 API calls 73810->73818 73812->73784 73814 7ff64b8b0450 49 API calls 73813->73814 73815 7ff64b8e513a 73814->73815 73816 7ff64b8b0450 49 API calls 73815->73816 73817 7ff64b8e3d65 73816->73817 73817->73799 73818->73812 73819 7ff64b91c490 GetWindowTextW 73820 7ff64b8b0450 49 API calls 73819->73820 73821 7ff64b91c4eb 73820->73821 73822 7ff64b8f8e90 72 API calls 73821->73822 73823 7ff64b91c4ff 73822->73823 73824 7ff64b8b0450 49 API calls 73823->73824 73835 7ff64b91c569 73823->73835 73825 7ff64b91c555 73824->73825 73829 7ff64b8f8e90 72 API calls 73825->73829 73826 7ff64b8b3680 RtlFreeHeap 73828 7ff64b91c5cc 73826->73828 73827 7ff64b91c5e7 73831 7ff64b91c63e 73827->73831 73832 7ff64b8b11a0 51 API calls 73827->73832 73828->73827 73830 7ff64b8b3680 RtlFreeHeap 73828->73830 73829->73835 73830->73827 73833 7ff64b91c613 73832->73833 73838 7ff64b918130 51 API calls 73833->73838 73835->73826 73835->73828 73836 7ff64b91c626 73837 7ff64b8b3c10 47 API calls 73836->73837 73837->73831 73838->73836

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 0 7ff64b9295b0-7ff64b929672 call 7ff64b8b1200 * 2 call 7ff64b8eca20 call 7ff64b8b0510 call 7ff64b8ad210 call 7ff64b9143b0 call 7ff64b914e20 call 7ff64b90f650 17 7ff64b929678-7ff64b9296dc call 7ff64b918170 call 7ff64b935ad0 call 7ff64b8c5cb0 0->17 18 7ff64b929741 0->18 17->18 40 7ff64b9296de-7ff64b929732 call 7ff64b918170 call 7ff64b935ad0 call 7ff64b8c5cb0 17->40 19 7ff64b92974c-7ff64b929761 18->19 22 7ff64b929776-7ff64b92977f 19->22 23 7ff64b929763-7ff64b929775 call 7ff64b8b3c10 19->23 26 7ff64b929781-7ff64b929793 call 7ff64b8b3c10 22->26 27 7ff64b929794-7ff64b92979b 22->27 23->22 26->27 31 7ff64b9297a1-7ff64b92982d call 7ff64b935a70 call 7ff64b8b5040 call 7ff64b8b3c10 call 7ff64b935a70 call 7ff64b8b5040 call 7ff64b8b3c10 27->31 32 7ff64b929832-7ff64b929974 call 7ff64b8b05d0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8fd390 call 7ff64bac3da0 call 7ff64b8b3680 * 2 27->32 69 7ff64b929975-7ff64b929a40 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 WinHttpOpen call 7ff64b8b3680 31->69 32->69 40->18 62 7ff64b929734-7ff64b92973f 40->62 62->19 93 7ff64b929a46-7ff64b929b4c call 7ff64b8b11a0 call 7ff64b8f98a0 GetLastError call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8fd3e0 call 7ff64bac3da0 call 7ff64b8b3680 * 2 69->93 94 7ff64b929b4d-7ff64b929b73 WinHttpSetTimeouts 69->94 93->94 96 7ff64b929b79-7ff64b929c8b WinHttpCloseHandle call 7ff64b8b11a0 call 7ff64b8f98a0 GetLastError call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8fd3e0 call 7ff64bac3da0 call 7ff64b8b3680 * 2 94->96 97 7ff64b929c8c-7ff64b929cba call 7ff64b8c3200 WinHttpConnect 94->97 96->97 104 7ff64b929cc0-7ff64b929dd2 WinHttpCloseHandle call 7ff64b8b11a0 call 7ff64b8f98a0 GetLastError call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8fd3e0 call 7ff64bac3da0 call 7ff64b8b3680 * 2 97->104 105 7ff64b929dd3-7ff64b929eda call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8c3200 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 WinHttpOpenRequest call 7ff64b8b3680 97->105 104->105 161 7ff64b929ee0-7ff64b929ffd WinHttpCloseHandle * 2 call 7ff64b8b11a0 call 7ff64b8f98a0 GetLastError call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8fd3e0 call 7ff64bac3da0 call 7ff64b8b3680 * 2 105->161 162 7ff64b929ffe-7ff64b92a038 WinHttpSendRequest 105->162 161->162 166 7ff64b92a1a8-7ff64b92a2d0 WinHttpCloseHandle * 3 call 7ff64b8b11a0 call 7ff64b8f98a0 GetLastError call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8fd3e0 call 7ff64bac3da0 call 7ff64b8b3680 * 2 162->166 167 7ff64b92a03e-7ff64b92a04d WinHttpReceiveResponse 162->167 177 7ff64b92a2d1-7ff64b92a304 call 7ff64b8b1680 call 7ff64b9142e0 166->177 167->166 169 7ff64b92a053-7ff64b92a09c WinHttpQueryHeaders 167->169 172 7ff64b92a0a2-7ff64b92a0ab GetLastError 169->172 173 7ff64b92a1a3 169->173 172->173 176 7ff64b92a0b1-7ff64b92a0b6 172->176 173->177 176->173 181 7ff64b92a0bc-7ff64b92a14d call 7ff64b8b1200 call 7ff64b8cc710 call 7ff64b8cc1b0 call 7ff64b8c3200 WinHttpQueryHeaders call 7ff64b8cc710 176->181 195 7ff64b92a30a-7ff64b92a336 call 7ff64b8ad210 call 7ff64b9141a0 177->195 196 7ff64b92a493-7ff64b92a4bb call 7ff64b8b1390 call 7ff64b9183c0 177->196 233 7ff64b92a14f-7ff64b92a194 call 7ff64b9145f0 call 7ff64b917cb0 call 7ff64b8f60e0 181->233 234 7ff64b92a195-7ff64b92a1a2 call 7ff64b8b3c10 181->234 216 7ff64b92a33b-7ff64b92a389 call 7ff64b9178d0 call 7ff64b919330 call 7ff64b92e640 195->216 220 7ff64b92a4bd-7ff64b92a4e0 call 7ff64b8fe7c0 196->220 221 7ff64b92a4e1-7ff64b92a4ed 196->221 216->196 261 7ff64b92a38f-7ff64b92a492 WinHttpCloseHandle * 3 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8fd390 call 7ff64bac3da0 call 7ff64b8b3680 * 2 216->261 220->221 228 7ff64b92a4f2-7ff64b92a504 call 7ff64b918ed0 221->228 246 7ff64b92a50a-7ff64b92a524 WinHttpQueryDataAvailable 228->246 247 7ff64b92a84b-7ff64b92a855 228->247 233->234 234->173 252 7ff64b92a52a-7ff64b92a630 call 7ff64b8b11a0 call 7ff64b8f98a0 GetLastError call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8fd3e0 call 7ff64bac3da0 call 7ff64b8b3680 * 2 246->252 253 7ff64b92a631-7ff64b92a636 246->253 250 7ff64b92a857-7ff64b92a85f call 7ff64b926510 247->250 251 7ff64b92a865-7ff64b92a952 WinHttpCloseHandle * 3 call 7ff64b8b3ce0 call 7ff64b919330 call 7ff64b8d9470 call 7ff64b8b3680 * 2 call 7ff64b9171a0 call 7ff64b916f70 call 7ff64b8b3680 call 7ff64b8b3c10 * 3 call 7ff64b8b3ce0 * 2 247->251 263 7ff64b92a864 250->263 252->253 259 7ff64b92a638-7ff64b92a63d 253->259 260 7ff64b92a642-7ff64b92a6c4 call 7ff64b8dbc10 call 7ff64b932b60 call 7ff64b932c10 call 7ff64b935190 call 7ff64b8c2900 WinHttpReadData 253->260 259->247 308 7ff64b92a6ca-7ff64b92a6d4 260->308 309 7ff64b92a83f-7ff64b92a844 260->309 261->196 263->251 313 7ff64b92a6da-7ff64b92a713 call 7ff64b8c2900 call 7ff64b9374d0 308->313 314 7ff64b92a770-7ff64b92a7d6 call 7ff64b8b1200 call 7ff64b8df420 call 7ff64b8db5c0 call 7ff64b90a240 308->314 309->247 333 7ff64b92a718-7ff64b92a72b call 7ff64b9183c0 313->333 344 7ff64b92a7db-7ff64b92a846 call 7ff64b8c3200 call 7ff64b9374d0 call 7ff64b8b3c10 314->344 333->314 340 7ff64b92a72d-7ff64b92a736 333->340 340->314 343 7ff64b92a738-7ff64b92a76f call 7ff64b918e40 340->343 343->314 344->228
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Http$CloseHandle$ErrorLast$Query$DataHeadersOpenRequest$AvailableConnectExceptionFileHeaderRaiseReadReceiveResponseSendTimeouts
                                                                                                                                                                                                                                                      • String ID: GET$URL format is not valid : %ws$WinHTTP 1.0$^(https?://(?:www.)?([^/]+))(/.*)?$$file creation failure$handle connection failure$handle initialization failure$handle request creation failure$handle request or response failure$query data not available$timeout init failure
                                                                                                                                                                                                                                                      • API String ID: 1266729962-202491335
                                                                                                                                                                                                                                                      • Opcode ID: a1859295019b1885de16e352e21e90b23f21142ad1b1302a3e01634e5ef6bab9
                                                                                                                                                                                                                                                      • Instruction ID: fd2057f0e086e702c3432984c21b26fe3727a7d07a35adc51cb4d37dac7a83f9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a1859295019b1885de16e352e21e90b23f21142ad1b1302a3e01634e5ef6bab9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FAA2C53261DAC295EA70BB10E8913EBB365FBC9740F405536D68D83AAAEF3CD545CB40

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: GlobalResource$Lock$AllocCreateErrorFindLastLoadSizeofStreamUnlock
                                                                                                                                                                                                                                                      • String ID: &$PNG
                                                                                                                                                                                                                                                      • API String ID: 3493741157-3047161795
                                                                                                                                                                                                                                                      • Opcode ID: a2c06dc25bda38559360ae671d947d6f58e99bb9c09f315c507cbfd297364e45
                                                                                                                                                                                                                                                      • Instruction ID: 577475bc5a0a14e70f27e06455679d69c1c56920c4c979f2db02ee6d8fc4c14b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a2c06dc25bda38559360ae671d947d6f58e99bb9c09f315c507cbfd297364e45
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D931957661CB8586D760AB15F49436AB7B0FB8E794F104136EA8E83B79DF3CD1548B00

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 3029 7ff64b8b8790-7ff64b8b89c3 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b05d0 call 7ff64b95b750 3074 7ff64b8b89c9-7ff64b8b8bd6 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0510 * 3 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b93d350 call 7ff64b8b3680 * 7 call 7ff64b8b3c10 * 4 3029->3074 3075 7ff64b8b8bdb-7ff64b8b8be5 call 7ff64b92e480 3029->3075 3215 7ff64b8b9315-7ff64b8b931c 3074->3215 3080 7ff64b8b8e18-7ff64b8b8fa0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64baf4170 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b919c90 3075->3080 3081 7ff64b8b8beb-7ff64b8b8e13 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0510 * 3 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b93d350 call 7ff64b8b3680 * 7 call 7ff64b8b3c10 * 4 3075->3081 3141 7ff64b8b8fa5-7ff64b8b8fc9 call 7ff64b8b3680 * 2 3080->3141 3081->3215 3157 7ff64b8b9032-7ff64b8b9310 GetLastError FormatMessageW call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8bae30 * 2 call 7ff64b8b0510 * 2 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b93d350 call 7ff64b8b3680 * 7 call 7ff64b8b3c10 * 4 3141->3157 3158 7ff64b8b8fcb-7ff64b8b902d call 7ff64b8b3680 * 3 call 7ff64b8b3c10 * 4 3141->3158 3157->3215 3158->3215
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: .\nwjs\NW_store.exe$.\ui\.$UI StartedMain process ID:%d$creation_error=%ws$directory_switching_error$product$ui_creation_failed$ui_termination_error
                                                                                                                                                                                                                                                      • API String ID: 0-2964731665
                                                                                                                                                                                                                                                      • Opcode ID: ad4cc86c9edad79a3be5b25b10a68e8f980b1a949aa8f3274e09367b564bd655
                                                                                                                                                                                                                                                      • Instruction ID: 9b83a8b12563cb4034e624aa29624ce7a5d6cc7fe061fc950367096696997c75
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ad4cc86c9edad79a3be5b25b10a68e8f980b1a949aa8f3274e09367b564bd655
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7D42C63264DAC2A5DA71BB24E4912EBB364FBC9740F401536E68C82B7AEF3CD555CB40

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 3629 7ff64b90bfe0-7ff64b90c003 3630 7ff64b90c052-7ff64b90c09a call 7ff64b90ef00 3629->3630 3631 7ff64b90c005-7ff64b90c04d call 7ff64b8b2a70 3629->3631 3637 7ff64b90c0a4-7ff64b90c0d1 call 7ff64b8b2a70 call 7ff64b8d0720 * 2 3630->3637 3638 7ff64b90c41c-7ff64b90c423 3631->3638 3645 7ff64b90c0d7-7ff64b90c0fd LoadLibraryW GetProcAddress 3637->3645 3646 7ff64b90c17c-7ff64b90c188 call 7ff64b8d0720 3637->3646 3647 7ff64b90c11a-7ff64b90c178 call 7ff64b8b2a70 3645->3647 3648 7ff64b90c0ff-7ff64b90c115 3645->3648 3652 7ff64b90c1a6-7ff64b90c209 call 7ff64b914790 call 7ff64b9320d0 call 7ff64baf387c call 7ff64b8abc20 * 2 call 7ff64b8fe190 3646->3652 3653 7ff64b90c18a-7ff64b90c1a1 call 7ff64b8b2a70 3646->3653 3647->3646 3648->3638 3671 7ff64b90c212-7ff64b90c232 call 7ff64b932fb0 3652->3671 3653->3638 3674 7ff64b90c238-7ff64b90c2a8 call 7ff64b8cc710 call 7ff64b8b7170 call 7ff64b8c3200 LoadLibraryW call 7ff64b8b02f0 call 7ff64b8ca8b0 call 7ff64b8cc710 call 7ff64b918400 3671->3674 3675 7ff64b90c3de-7ff64b90c414 call 7ff64b8ad210 call 7ff64baf3882 call 7ff64b8b3c10 call 7ff64b917010 3671->3675 3698 7ff64b90c2ba-7ff64b90c2de call 7ff64b8ad210 GetProcAddress 3674->3698 3699 7ff64b90c2aa-7ff64b90c2b5 call 7ff64b917090 3674->3699 3675->3638 3704 7ff64b90c2f0-7ff64b90c348 call 7ff64b914790 call 7ff64b9320d0 3698->3704 3705 7ff64b90c2e0-7ff64b90c2eb call 7ff64b917090 3698->3705 3699->3671 3713 7ff64b90c34a-7ff64b90c35f call 7ff64b917010 call 7ff64b917090 3704->3713 3714 7ff64b90c364-7ff64b90c3c2 call 7ff64b8cbcd0 call 7ff64b927f50 call 7ff64b8b2a70 call 7ff64b917010 call 7ff64b917090 call 7ff64b8b3c10 call 7ff64b917010 3704->3714 3705->3671 3713->3671 3714->3638
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                                                      • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll$combase.dll
                                                                                                                                                                                                                                                      • API String ID: 2574300362-4170001172
                                                                                                                                                                                                                                                      • Opcode ID: 8fab117c1cdc8e3682f0ec68a2ac1de93d45519c69ca58d2309001f4c9a9c856
                                                                                                                                                                                                                                                      • Instruction ID: 4b17de963a3e4cd62c566bbbb42985773db5a24db36fd598ac2ead72ce7e46b3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8fab117c1cdc8e3682f0ec68a2ac1de93d45519c69ca58d2309001f4c9a9c856
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DFB10F3260DA8291DA60FB25E4513FAA764FBDA790F404132E68DC3ABADF3CD545DB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$CreateErrorLast$CloseHandle$Type
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 352418905-0
                                                                                                                                                                                                                                                      • Opcode ID: e343539a376f2db1ff088acd6fe61eef78b7cbf5639aa4d1d11734894c44e91c
                                                                                                                                                                                                                                                      • Instruction ID: 31caebc1e2d8e522ea82ec75bc319a52e43c018629111c300d13944417a4c5c4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e343539a376f2db1ff088acd6fe61eef78b7cbf5639aa4d1d11734894c44e91c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C3C1B136B28A4585EB50EFA9C4946AC3762FB49BA8F010235DE1E977A5DF38D0A1C310
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorFindLast$CloseCurrentDirectoryFileFirst
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2053822218-0
                                                                                                                                                                                                                                                      • Opcode ID: 09b9f346d3f10768f2854e58ae502533ef0d6213524300248e0eb877981d225b
                                                                                                                                                                                                                                                      • Instruction ID: caeecb784c4dc6def83bcae2ae7b8830a5ed84a0633574ab116a4f39873deb54
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 09b9f346d3f10768f2854e58ae502533ef0d6213524300248e0eb877981d225b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 06113D72A0C64282E7207F65E54433AA7A0FB4DBA4F144734DB6D86AE4DF3DD4948B20
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: keybd_event
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2665452162-0
                                                                                                                                                                                                                                                      • Opcode ID: a042bddbd6d60c66f133c626703260ee003b2161beff19cb918841546142377a
                                                                                                                                                                                                                                                      • Instruction ID: 607235a2b5b71b37da6ab625f8dc778132f958a0e676e6a5e3ce36f5f3233620
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a042bddbd6d60c66f133c626703260ee003b2161beff19cb918841546142377a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8FD0C970B1916342E7B03B61BD6AFA50FA07B5FBC9FA2B820C9040BF70CD1A12890750

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 360 7ff64b8f3d10-7ff64b8f47f0 call 7ff64bac2f90 call 7ff64b8b0350 call 7ff64b8efab0 call 7ff64b8b2bd0 CoInitializeEx call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b05d0 call 7ff64b8ad210 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b05d0 call 7ff64b8f6ea0 call 7ff64b8ad210 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93ca30 call 7ff64b8b3680 * 4 call 7ff64b8b05d0 call 7ff64b8ad210 call 7ff64b8f6ea0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0450 call 7ff64b94db90 call 7ff64b8b1390 * 2 call 7ff64b8f2880 call 7ff64b9295b0 call 7ff64b8f60e0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93ca30 call 7ff64b8b3680 * 4 513 7ff64b8f49f1-7ff64b8f49f8 360->513 514 7ff64b8f47f6-7ff64b8f49f0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b94db90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b94db90 call 7ff64b8b3680 * 2 360->514 515 7ff64b8f5880-7ff64b8f59af call 7ff64b8b3680 * 6 call 7ff64b8b05d0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 513->515 516 7ff64b8f49fe-7ff64b8f4ad2 call 7ff64baf4170 * 2 call 7ff64b8ad210 * 2 ShellExecuteExW 513->516 514->513 615 7ff64b8f59b5-7ff64b8f59bc 515->615 616 7ff64b8f5a3a-7ff64b8f5aac call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 515->616 543 7ff64b8f4bcf-7ff64b8f54d0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b05d0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93ca30 call 7ff64b8b3680 * 4 call 7ff64b8b05d0 call 7ff64b8ad210 call 7ff64b8f6ea0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0450 call 7ff64b94db90 WaitForSingleObject GetExitCodeProcess call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93ca30 call 7ff64b8b3680 * 4 call 7ff64b8b05d0 call 7ff64b8ad210 call 7ff64b8f6ea0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0450 call 7ff64b94db90 CloseHandle call 7ff64b8ad210 DeleteFileW 516->543 544 7ff64b8f4ad8-7ff64b8f4bca call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8f32d0 call 7ff64bac3da0 call 7ff64b8b3680 * 2 516->544 827 7ff64b8f57e6-7ff64b8f57ee call 7ff64b925f00 543->827 828 7ff64b8f54d6-7ff64b8f57e5 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b05d0 call 7ff64b8ad210 GetLastError call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93ca30 call 7ff64b8b3680 * 7 543->828 544->515 615->616 618 7ff64b8f59be-7ff64b8f5a38 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 615->618 635 7ff64b8f5ab4-7ff64b8f5ad3 call 7ff64b8b0510 616->635 618->635 642 7ff64b8f5ad5-7ff64b8f5ae7 call 7ff64b8b3680 635->642 643 7ff64b8f5ae8-7ff64b8f5af1 635->643 642->643 646 7ff64b8f5af3-7ff64b8f5b05 call 7ff64b8b3680 643->646 647 7ff64b8f5b06-7ff64b8f5b1b call 7ff64b8b05d0 643->647 646->647 657 7ff64b8f5b30 647->657 658 7ff64b8f5b1d-7ff64b8f5b24 647->658 661 7ff64b8f5b38-7ff64b8f5ed2 call 7ff64b8ad210 call 7ff64b8f6ea0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0450 call 7ff64b94db90 call 7ff64b8ad210 call 7ff64b8f6ea0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0450 call 7ff64b94db90 call 7ff64b8b3680 * 10 call 7ff64b8b46c0 657->661 658->657 659 7ff64b8f5b26-7ff64b8f5b2e 658->659 659->661 777 7ff64b8f5ed7-7ff64b8f5f42 call 7ff64b8b3680 * 5 call 7ff64b8b3ce0 * 2 661->777 832 7ff64b8f57f3-7ff64b8f580a 827->832 828->827 834 7ff64b8f5813 832->834 835 7ff64b8f580c-7ff64b8f5811 832->835 837 7ff64b8f5818-7ff64b8f587f call 7ff64b8b3680 * 7 834->837 835->837 837->515
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCodeDeleteErrorExecuteExitFileHandleInitializeLastObjectProcessShellSingleWait
                                                                                                                                                                                                                                                      • String ID: 00000000-0000-0000-0000-D05099DB2397$@$Execution failure$delete_error$dl_start$dl_successful$eC=%d&oid=%d&entry_app=%ws$exec_end$exec_start$h$https://pcapp.store/dl_cta_open.php?guid=%ws&oid=%lu&entryApp=%ws$installed$none$oid=%d&entry_app=%ws$oid=%d&entry_app=%ws&exitCode=%d$oid=%d&entry_app=%ws&source=%ws$p$product${"app" : {"%ws" : {"dl_app_result" : {"name":"%ws","status" : %d}}}}${"app": {"notifications": {"offerIsOpen": false}}}${"app":{"%ws":{"app_status":{"name":"%ws","status":"%ws"}}}}${"app":{"offer": {"offerInfo":{"oid":0,"otype":""}},"hide_window":"offer"}}
                                                                                                                                                                                                                                                      • API String ID: 1332431403-54875173
                                                                                                                                                                                                                                                      • Opcode ID: 657389c0280514427f384ae410d1dae63ec4c2c9a18621aef96b12ae14c2aa32
                                                                                                                                                                                                                                                      • Instruction ID: 434d40db01d2bee868b34267abbf4374ea8e7ac4c60f5cc8556cce5999ec0e99
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 657389c0280514427f384ae410d1dae63ec4c2c9a18621aef96b12ae14c2aa32
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1803B33261DBC599DA70AB14E8902EBB3A5FBC9740F405126E6CD83B6AEF3CD554CB40

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 898 7ff64b8bb130-7ff64b8bb23b call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 call 7ff64b8b3680 RegisterClassExW 911 7ff64b8bb24d-7ff64b8bb348 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 CreateWindowExW call 7ff64b8b3680 898->911 912 7ff64b8bb23d-7ff64b8bb248 call 7ff64b8b3680 898->912 924 7ff64b8bb35a-7ff64b8bb5ba ShowWindow call 7ff64bac2956 call 7ff64b8b1200 call 7ff64b8cc710 call 7ff64b8cc1b0 call 7ff64b8b1200 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b5950 call 7ff64b8b5880 call 7ff64b8b3680 * 3 911->924 925 7ff64b8bb34a-7ff64b8bb355 call 7ff64b8b3680 911->925 917 7ff64b8bc03b-7ff64b8bc043 912->917 964 7ff64b8bb5bb-7ff64b8bb5cc 924->964 925->917 965 7ff64b8bb5d2-7ff64b8bb633 call 7ff64b8b50c0 GetForegroundWindow call 7ff64b8c3200 GetWindowTextW call 7ff64b8c60e0 964->965 966 7ff64b8bbfd8-7ff64b8bc03a call 7ff64bac295c call 7ff64b8b3680 * 3 call 7ff64b8b3c10 * 2 call 7ff64b8b3680 964->966 980 7ff64b8bb635-7ff64b8bb64e call 7ff64b8c60e0 965->980 981 7ff64b8bb662-7ff64b8bb68c PeekMessageW 965->981 966->917 980->981 992 7ff64b8bb650-7ff64b8bb659 980->992 984 7ff64b8bbe21-7ff64b8bbe2c SleepEx 981->984 985 7ff64b8bb692-7ff64b8bb6ba TranslateMessage DispatchMessageW 981->985 988 7ff64b8bbe2d-7ff64b8bbe36 984->988 989 7ff64b8bb6c0-7ff64b8bba68 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93d350 call 7ff64b8b3680 * 5 call 7ff64b8cd500 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8c3b30 call 7ff64b8b3680 * 5 985->989 990 7ff64b8bba6d-7ff64b8bba78 985->990 993 7ff64b8bbe51-7ff64b8bbe7c call 7ff64b8ad210 OpenEventW 988->993 994 7ff64b8bbe38 988->994 995 7ff64b8bbe1f 989->995 990->995 996 7ff64b8bba7e-7ff64b8bbe1e call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93d350 call 7ff64b8b3680 * 5 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8c3b30 call 7ff64b8b3680 * 5 990->996 992->981 1000 7ff64b8bb65b 992->1000 1010 7ff64b8bbfd3 993->1010 1011 7ff64b8bbe82-7ff64b8bbe94 WaitForSingleObject 993->1011 1001 7ff64b8bbe38 call 7ff64b91ab70 994->1001 995->988 996->995 1000->981 1006 7ff64b8bbe3d-7ff64b8bbe42 1001->1006 1013 7ff64b8bbe44 call 7ff64b935130 1006->1013 1014 7ff64b8bbe4a 1006->1014 1010->964 1011->1010 1019 7ff64b8bbe9a-7ff64b8bbfd2 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b94db90 CloseHandle call 7ff64b8b3c10 1011->1019 1021 7ff64b8bbe49 1013->1021 1014->993 1019->1010 1021->1014
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClassCreateRegisterWindow
                                                                                                                                                                                                                                                      • String ID: ENDING_EVT_HANDLER$Local$P$PCAppStore$Windows Default Lock Screen$logoff$msg=logoff$msg=shutdown$product$product$shutdown$system_event$system_event${"app":{"menu_search":{"search_request":"", "page":"b"},"show_window": "menu_search"}}
                                                                                                                                                                                                                                                      • API String ID: 3469048531-4236414880
                                                                                                                                                                                                                                                      • Opcode ID: e3db5f2ec02d19e999b21b8d76df27be58171ed9378f3000db9257bc34c37085
                                                                                                                                                                                                                                                      • Instruction ID: 2f9211730d23d24860150b4df34f15417f8376b36ab493a56cab31d88eea8d1e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e3db5f2ec02d19e999b21b8d76df27be58171ed9378f3000db9257bc34c37085
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E672C53261DBC195EA71BB24E4903EAA365FBC9740F405136E68D83BAAEF3CD554CB40

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 1153 7ff64b8bc290-7ff64b8bc718 call 7ff64bac2f90 call 7ff64b8ca0d0 call 7ff64b8cd500 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b05d0 call 7ff64b91a6b0 call 7ff64b8ad210 * 2 call 7ff64b8ba250 call 7ff64b8b3680 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93ca30 call 7ff64b8b3680 * 4 call 7ff64b8a8ad0 call 7ff64b8c48d0 call 7ff64b8b8790 1234 7ff64b8bc71e-7ff64b8bc804 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8c3b30 call 7ff64b8b3680 call 7ff64b8b4e10 call 7ff64b8b3680 * 2 call 7ff64b8b3c10 call 7ff64b8b3680 * 5 1153->1234 1235 7ff64b8bc809-7ff64b8bc818 call 7ff64b932f10 call 7ff64b8cb220 1153->1235 1325 7ff64b8be29b-7ff64b8be2a2 1234->1325 1244 7ff64b8bc819-7ff64b8bc82c call 7ff64b94e340 1235->1244 1250 7ff64b8bca43-7ff64b8bca6e call 7ff64b8ccdd0 call 7ff64b8c97e0 call 7ff64b8cb220 1244->1250 1251 7ff64b8bc832-7ff64b8bc843 1244->1251 1271 7ff64b8bca73-7ff64b8bca86 call 7ff64b94d2d0 1250->1271 1251->1250 1253 7ff64b8bc849-7ff64b8bc891 call 7ff64b8cb220 call 7ff64b8aa520 call 7ff64b8a9a20 call 7ff64b8c4400 1251->1253 1283 7ff64b8bca11-7ff64b8bca38 call 7ff64b94d390 call 7ff64b8b7d40 call 7ff64b8afed0 1253->1283 1284 7ff64b8bc897-7ff64b8bca0c call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8c3340 call 7ff64b8b3680 call 7ff64b932f10 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8c3b30 call 7ff64b8b3680 call 7ff64b8cbd30 call 7ff64b8b4e10 call 7ff64b8b3680 * 2 call 7ff64b8b3c10 call 7ff64b8b3680 * 5 1253->1284 1281 7ff64b8bca8c-7ff64b8bca9d 1271->1281 1282 7ff64b8bcc8b-7ff64b8bcf0d call 7ff64b8b02f0 call 7ff64b8a93b0 call 7ff64ba8f450 call 7ff64ba8f480 call 7ff64b8b0510 * 3 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93ca30 call 7ff64b8b3680 * 5 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b94db90 1271->1282 1281->1282 1287 7ff64b8bcaa3-7ff64b8bcaeb call 7ff64b8cb220 call 7ff64b8aa520 call 7ff64b8a9a20 call 7ff64b8c4400 1281->1287 1423 7ff64b8bcf0f-7ff64b8bcf78 call 7ff64b8b4e10 call 7ff64b8b3680 * 2 call 7ff64b8b3c10 call 7ff64b8b3680 * 5 1282->1423 1424 7ff64b8bcf7d-7ff64b8bd513 call 7ff64b8ad210 call 7ff64b8e01e0 call 7ff64b8abc20 call 7ff64b96a2b0 call 7ff64b8b4730 call 7ff64b8ad210 call 7ff64b8e1a90 call 7ff64b8abc20 call 7ff64b96a0c0 call 7ff64b8b4730 call 7ff64b8ad210 * 2 call 7ff64b94a070 call 7ff64b8abc20 call 7ff64b96a0c0 call 7ff64b8b4730 call 7ff64b8ad210 call 7ff64b94fd90 call 7ff64b8abc20 call 7ff64b96a2b0 call 7ff64b8b4730 call 7ff64b8ad210 * 2 call 7ff64b9538c0 call 7ff64b8abc20 call 7ff64b96a160 call 7ff64b8b4730 call 7ff64b8ad210 * 2 call 7ff64b958be0 call 7ff64b8abc20 call 7ff64b96a2b0 call 7ff64b8b4730 call 7ff64b8ad210 call 7ff64b959bc0 call 7ff64b8abc20 call 7ff64b96a2b0 call 7ff64b8b4730 call 7ff64b8ad210 call 7ff64b95ff90 call 7ff64b8abc20 call 7ff64b96a2b0 call 7ff64b8b4730 call 7ff64b8ad210 * 2 call 7ff64b96ea80 call 7ff64b8abc20 call 7ff64b96a160 call 7ff64b8b4730 1282->1424 1313 7ff64b8bca3d-7ff64b8bca3e 1283->1313 1284->1325 1329 7ff64b8bcaf1-7ff64b8bcc66 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8c3340 call 7ff64b8b3680 call 7ff64b932f10 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8c3b30 call 7ff64b8b3680 call 7ff64b8cbd30 call 7ff64b8b4e10 call 7ff64b8b3680 * 2 call 7ff64b8b3c10 call 7ff64b8b3680 * 5 1287->1329 1330 7ff64b8bcc6b-7ff64b8bcc86 call 7ff64b8b7d40 call 7ff64b8afed0 1287->1330 1313->1244 1329->1325 1330->1271 1423->1325 1549 7ff64b8bd515-7ff64b8bd523 call 7ff64b8c9dd0 1424->1549 1550 7ff64b8bd528-7ff64b8bd574 call 7ff64b8ad210 * 2 call 7ff64ba5f510 1424->1550 1556 7ff64b8bd5ca-7ff64b8bd96d call 7ff64b8ad210 * 2 call 7ff64ba5cd30 call 7ff64b8abc20 call 7ff64b96a0c0 call 7ff64b8b4730 call 7ff64b8ad210 * 2 call 7ff64ba64210 call 7ff64b8abc20 call 7ff64b96a160 call 7ff64b8b4730 call 7ff64b8ad210 * 2 call 7ff64ba72560 call 7ff64b8abc20 call 7ff64b96a2b0 call 7ff64b8b4730 call 7ff64b8ad210 call 7ff64ba75180 call 7ff64b8abc20 call 7ff64b96a2b0 call 7ff64b8b4730 call 7ff64b8ad210 call 7ff64b96ab80 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64ba73e60 call 7ff64b8a8ad0 call 7ff64b8c48d0 call 7ff64b8a8ad0 1549->1556 1561 7ff64b8bd579-7ff64b8bd5c9 call 7ff64b8abc20 call 7ff64b96a0c0 call 7ff64b8b4730 1550->1561 1633 7ff64b8bd972-7ff64b8bda53 call 7ff64b8c48d0 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b94db90 WaitForSingleObject call 7ff64ba8f4d0 1556->1633 1561->1556 1644 7ff64b8be1a5-7ff64b8be1f8 call 7ff64b94d420 call 7ff64b932f10 call 7ff64b8c62c0 ResetEvent 1633->1644 1645 7ff64b8bda59-7ff64b8bda75 WaitForSingleObject 1633->1645 1660 7ff64b8be208-7ff64b8be29a call 7ff64b8b4e10 * 2 call 7ff64b8b3c10 call 7ff64b8b4e10 call 7ff64b8b3680 * 2 call 7ff64b8b3c10 call 7ff64b8b3680 * 5 1644->1660 1661 7ff64b8be1fa-7ff64b8be207 call 7ff64b8cbd30 1644->1661 1647 7ff64b8be180-7ff64b8be1a4 CloseHandle * 2 1645->1647 1648 7ff64b8bda7b-7ff64b8bdd19 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8b0510 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93cb80 call 7ff64b95b750 1645->1648 1647->1644 1714 7ff64b8bdf40-7ff64b8bdf45 1648->1714 1715 7ff64b8bdd1f-7ff64b8bdf3b call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b0510 * 3 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93d350 call 7ff64b8b3680 * 5 call 7ff64b8b3c10 1648->1715 1660->1325 1661->1660 1716 7ff64b8be167-7ff64b8be17f call 7ff64b8b3c10 call 7ff64b8b3680 1714->1716 1717 7ff64b8bdf4b-7ff64b8be166 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b0510 * 3 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93d350 call 7ff64b8b3680 * 5 call 7ff64b8b3c10 1714->1717 1715->1716 1716->1647 1717->1716
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Name$CloseDefaultFileLanguageLocaleModuleOpenUserValue
                                                                                                                                                                                                                                                      • String ID: prnt=%ws&sys_lang=%ws$product$product$started$ui_closing_failed$ui_closing_timeout$ui_creation_error$ui_not_found$waiting_for_UI_connection$waiting_for_windows_creation$windows_created${"app" : {"show_window":"main"}}${"app": {"init": {"engineInit": true}}}
                                                                                                                                                                                                                                                      • API String ID: 3003830863-622979156
                                                                                                                                                                                                                                                      • Opcode ID: 0195e5e4fc49e5d8400b13b120f7d5bb36dcb4d9815857f99ddee508b2439eee
                                                                                                                                                                                                                                                      • Instruction ID: 15101d50fb0a6e0c11088be6fcbc9147cafc22958049185b7bb9802b1e154eac
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0195e5e4fc49e5d8400b13b120f7d5bb36dcb4d9815857f99ddee508b2439eee
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 47F2EB3260DEC195DA70BB24E4913EBA364FBC9780F401536E68D87BAAEE2CD555CB40

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 2847 7ff64b8be340-7ff64b8be36a 2848 7ff64b8be395-7ff64b8be39d 2847->2848 2849 7ff64b8be36c-7ff64b8be371 2847->2849 2852 7ff64b8be425-7ff64b8be42e 2848->2852 2853 7ff64b8be3a3-7ff64b8be3ab 2848->2853 2850 7ff64b8be420 2849->2850 2851 7ff64b8be377-7ff64b8be37c 2849->2851 2854 7ff64b8be9ec-7ff64b8bea0b DefWindowProcW 2850->2854 2857 7ff64b8be37e-7ff64b8be383 2851->2857 2858 7ff64b8be3b6 2851->2858 2855 7ff64b8be434-7ff64b8be6d8 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93d350 call 7ff64b8b3680 * 8 2852->2855 2856 7ff64b8be6dd-7ff64b8be6e6 2852->2856 2859 7ff64b8be3b1 2853->2859 2860 7ff64b8be99b-7ff64b8be9a4 2853->2860 2868 7ff64b8bea11-7ff64b8bea18 2854->2868 2861 7ff64b8be999 2855->2861 2856->2861 2862 7ff64b8be6ec-7ff64b8be998 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0510 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b93d350 call 7ff64b8b3680 * 8 2856->2862 2866 7ff64b8be389-7ff64b8be38e 2857->2866 2867 7ff64b8be9ba-7ff64b8be9c3 PostQuitMessage 2857->2867 2858->2854 2869 7ff64b8be9c5-7ff64b8be9ea DefWindowProcW 2859->2869 2864 7ff64b8be9b8 2860->2864 2865 7ff64b8be9a6-7ff64b8be9af 2860->2865 2861->2854 2862->2861 2864->2854 2865->2864 2872 7ff64b8be9b1 2865->2872 2873 7ff64b8be390 2866->2873 2874 7ff64b8be3bb-7ff64b8be3d1 2866->2874 2867->2854 2869->2854 2869->2868 2872->2864 2873->2869 2877 7ff64b8be3ef-7ff64b8be3f8 2874->2877 2878 7ff64b8be3d3-7ff64b8be3ed PostMessageW 2874->2878 2881 7ff64b8be414-7ff64b8be416 2877->2881 2882 7ff64b8be3fa-7ff64b8be413 PostMessageW 2877->2882 2878->2881 2881->2868 2882->2881
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessagePostProcWindow$Quit
                                                                                                                                                                                                                                                      • String ID: msg=resume_suspend$msg=suspend$product$product$system_event$system_event
                                                                                                                                                                                                                                                      • API String ID: 3552470998-2520652036
                                                                                                                                                                                                                                                      • Opcode ID: 3a5b2b2766910286d68f0c31224ade0bbce32a53d470bd98d0ac6cfde111d970
                                                                                                                                                                                                                                                      • Instruction ID: 4e6ed137931727faf56b68d61256277a9b7d01801aee1260ccc647e3e85bc4c7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3a5b2b2766910286d68f0c31224ade0bbce32a53d470bd98d0ac6cfde111d970
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 76F1C73251DBC699EA71BB24E4803EAB3A4FBC9340F405536EA8D86B69DF3CD554CB40

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 2968 7ff64b8fbe70-7ff64b8fbeab 2969 7ff64b8fbeb1-7ff64b8fbeca call 7ff64b8e6b60 2968->2969 2970 7ff64b8fbf50-7ff64b8fbf52 2968->2970 2974 7ff64b8fbee1-7ff64b8fbeed 2969->2974 2975 7ff64b8fbecc-7ff64b8fbedf 2969->2975 2971 7ff64b8fc4c9-7ff64b8fc4d0 2970->2971 2976 7ff64b8fbef2-7ff64b8fbf5d call 7ff64b8ad210 WinHttpConnect 2974->2976 2975->2976 2980 7ff64b8fbf63-7ff64b8fc2bb call 7ff64b8b05d0 GetTickCount64 call 7ff64b8e6b60 2976->2980 2981 7ff64b8fc449-7ff64b8fc44b 2976->2981 2986 7ff64b8fc2dd-7ff64b8fc2f1 call 7ff64b8ad210 2980->2986 2987 7ff64b8fc2bd-7ff64b8fc2db call 7ff64b8ad210 2980->2987 2981->2971 2992 7ff64b8fc2f9-7ff64b8fc3cf call 7ff64b8ad210 call 7ff64b8ba250 call 7ff64b8ad210 WinHttpOpenRequest 2986->2992 2987->2992 2999 7ff64b8fc3d1-7ff64b8fc3f7 WinHttpSetTimeouts 2992->2999 3000 7ff64b8fc43c-7ff64b8fc453 call 7ff64b8b3680 2992->3000 2999->3000 3001 7ff64b8fc3f9-7ff64b8fc3ff 2999->3001 3009 7ff64b8fc485-7ff64b8fc48a 3000->3009 3010 7ff64b8fc455-7ff64b8fc481 WinHttpSendRequest 3000->3010 3004 7ff64b8fc401-7ff64b8fc40c WinHttpCloseHandle 3001->3004 3005 7ff64b8fc40d-7ff64b8fc413 3001->3005 3004->3005 3007 7ff64b8fc415-7ff64b8fc420 WinHttpCloseHandle 3005->3007 3008 7ff64b8fc421-7ff64b8fc437 call 7ff64b8b3680 3005->3008 3007->3008 3008->2971 3012 7ff64b8fc49d-7ff64b8fc4a3 3009->3012 3013 7ff64b8fc48c-7ff64b8fc499 WinHttpReceiveResponse 3009->3013 3010->3009 3015 7ff64b8fc4a5-7ff64b8fc4b0 WinHttpCloseHandle 3012->3015 3016 7ff64b8fc4b1-7ff64b8fc4b7 3012->3016 3013->3012 3015->3016 3017 7ff64b8fc4c5 3016->3017 3018 7ff64b8fc4b9-7ff64b8fc4c4 WinHttpCloseHandle 3016->3018 3017->2971 3018->3017
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Http$CloseHandle$Request$ConnectCount64OpenReceiveResponseSendTickTimeouts
                                                                                                                                                                                                                                                      • String ID: GET
                                                                                                                                                                                                                                                      • API String ID: 648938436-1805413626
                                                                                                                                                                                                                                                      • Opcode ID: aca000783c53d5a508a98d6040bb6e3a7e78a38913e3af21ed66d760a6f833b0
                                                                                                                                                                                                                                                      • Instruction ID: 29d6c64d617ad653f09c8a18e5996926a88a1c4bc8fb986bc943644d3af7150e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aca000783c53d5a508a98d6040bb6e3a7e78a38913e3af21ed66d760a6f833b0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DDF15F3660DFC589D6B0AB56F8843AAB3A4F799794F104126DACD83B69DF7CD094CB00

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 3255 7ff64ba64210-7ff64ba64236 3256 7ff64ba64247-7ff64ba64267 call 7ff64b948880 3255->3256 3257 7ff64ba64238-7ff64ba64245 3255->3257 3262 7ff64ba64e0b-7ff64ba64e12 3256->3262 3257->3256 3258 7ff64ba6426c-7ff64ba64507 call 7ff64ba62c40 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8ad210 CreateEventW call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b11a0 call 7ff64b8f98a0 3257->3258 3304 7ff64ba6450d-7ff64ba646e3 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b02f0 call 7ff64ba5fff0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64ba60210 call 7ff64b8b3680 * 3 3258->3304 3305 7ff64ba646e4-7ff64ba64cf9 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b02f0 call 7ff64ba60030 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64ba60210 call 7ff64b8b3680 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b02f0 call 7ff64ba60070 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64ba60210 call 7ff64b8b3680 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b02f0 call 7ff64ba5ffb0 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64ba60210 call 7ff64b8b3680 * 2 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64b8b02f0 call 7ff64ba5ff70 call 7ff64b8b0450 call 7ff64b8f8e90 call 7ff64ba60210 3258->3305 3304->3305 3397 7ff64ba64cfe-7ff64ba64e03 call 7ff64b8b3680 * 2 call 7ff64b8d12e0 call 7ff64b8b02f0 call 7ff64ba5feb0 call 7ff64b9487a0 call 7ff64b8b4730 call 7ff64b8b3680 * 8 3305->3397 3397->3262
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateEvent
                                                                                                                                                                                                                                                      • String ID: ClosingEvent$ColorPrevalence$ColorizationColor$EnableTransparency$Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced$Software\Microsoft\Windows\CurrentVersion\Themes\Personalize$Software\Microsoft\Windows\DWM$SystemUsesLightTheme$TaskbarAl
                                                                                                                                                                                                                                                      • API String ID: 2692171526-2470191940
                                                                                                                                                                                                                                                      • Opcode ID: 83cde789d96aa9074cbefad66f4ce03e7f5f2f04262af3f40ef153ca526d3072
                                                                                                                                                                                                                                                      • Instruction ID: ca8b9ea4d057823dab5fb93f850507b18278131bf525f7b40082d5216e8aa98b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 83cde789d96aa9074cbefad66f4ce03e7f5f2f04262af3f40ef153ca526d3072
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7352923661DBC595DAB1AB15E8903DBB3A4FBC9780F401126EACC83B69EF38D554CB40

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 3428 7ff64b8b97d0-7ff64b8b9ae5 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 call 7ff64b8b11a0 call 7ff64b8f98a0 call 7ff64b8ad210 call 7ff64b8b11a0 call 7ff64b8b3680 GetClassNameW 3479 7ff64b8b9b59-7ff64b8b9bc2 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8ad210 call 7ff64bac9110 3428->3479 3480 7ff64b8b9ae7-7ff64b8b9b04 GetWindowTextW 3428->3480 3497 7ff64b8b9bce 3479->3497 3498 7ff64b8b9bc4-7ff64b8b9bcc 3479->3498 3480->3479 3482 7ff64b8b9b06-7ff64b8b9b54 call 7ff64b8b3c10 * 5 3480->3482 3505 7ff64b8ba134-7ff64b8ba13c 3482->3505 3500 7ff64b8b9bd6-7ff64b8b9bf3 call 7ff64b8b3680 3497->3500 3498->3500 3506 7ff64b8b9bf9-7ff64b8b9c6a EnumChildWindows * 3 call 7ff64b8b3c10 3500->3506 3507 7ff64b8b9cad-7ff64b8b9cb6 3500->3507 3512 7ff64b8b9c6f-7ff64b8b9ca8 call 7ff64b8b3c10 * 4 3506->3512 3508 7ff64b8b9d43-7ff64b8b9d4a 3507->3508 3509 7ff64b8b9cbc-7ff64b8b9d3d call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8ad210 call 7ff64bac9110 3507->3509 3513 7ff64b8b9d50-7ff64b8b9d60 call 7ff64bac9298 3508->3513 3514 7ff64b8b9dd5-7ff64b8b9ddd 3508->3514 3509->3508 3560 7ff64b8b9ddf 3509->3560 3512->3505 3513->3514 3529 7ff64b8b9d62-7ff64b8b9dd3 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8ad210 call 7ff64bac9110 3513->3529 3517 7ff64b8b9de7-7ff64b8b9df9 3514->3517 3521 7ff64b8b9e0e-7ff64b8b9e17 3517->3521 3522 7ff64b8b9dfb-7ff64b8b9e0d call 7ff64b8b3680 3517->3522 3527 7ff64b8b9e19-7ff64b8b9e2b call 7ff64b8b3680 3521->3527 3528 7ff64b8b9e2c-7ff64b8b9e33 3521->3528 3522->3521 3527->3528 3530 7ff64b8b9e35-7ff64b8b9e92 call 7ff64b8b3c10 * 5 3528->3530 3531 7ff64b8b9e97-7ff64b8b9ea0 3528->3531 3529->3514 3529->3560 3530->3505 3542 7ff64b8b9f26 3531->3542 3543 7ff64b8b9ea6-7ff64b8b9f1a call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8ad210 call 7ff64bac9110 3531->3543 3547 7ff64b8b9f2e-7ff64b8b9f40 3542->3547 3543->3542 3600 7ff64b8b9f1c-7ff64b8b9f24 3543->3600 3554 7ff64b8b9f55-7ff64b8b9f5c 3547->3554 3555 7ff64b8b9f42-7ff64b8b9f54 call 7ff64b8b3680 3547->3555 3562 7ff64b8b9fc0-7ff64b8b9fc9 3554->3562 3563 7ff64b8b9f5e-7ff64b8b9fbb call 7ff64b8b3c10 * 5 3554->3563 3555->3554 3560->3517 3568 7ff64b8ba04f 3562->3568 3569 7ff64b8b9fcf-7ff64b8ba043 call 7ff64b8b10b0 call 7ff64b8f9220 call 7ff64b8ad210 call 7ff64bac9110 3562->3569 3563->3505 3575 7ff64b8ba057-7ff64b8ba069 3568->3575 3569->3568 3618 7ff64b8ba045-7ff64b8ba04d 3569->3618 3581 7ff64b8ba07e-7ff64b8ba085 3575->3581 3582 7ff64b8ba06b-7ff64b8ba07d call 7ff64b8b3680 3575->3582 3588 7ff64b8ba087-7ff64b8ba0e4 call 7ff64b8b3c10 * 5 3581->3588 3589 7ff64b8ba0e6-7ff64b8ba130 call 7ff64b8b3c10 * 5 3581->3589 3582->3581 3588->3505 3589->3505 3600->3547 3618->3575
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ChildEnumWindows$ClassNameTextWindow
                                                                                                                                                                                                                                                      • String ID: =====> %ws FOUND <=====$Shell_TrayWnd$Start$TrayButton$TrayDummySearchControl
                                                                                                                                                                                                                                                      • API String ID: 1800985010-2840285642
                                                                                                                                                                                                                                                      • Opcode ID: d33b9d749b3fb51d0582b3a0a45378c842a85a664efe6ee0f4cf09bbfba76665
                                                                                                                                                                                                                                                      • Instruction ID: 1e12bb3535178c9073ca840356200d41319e52095928865e5dc17d818c016293
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d33b9d749b3fb51d0582b3a0a45378c842a85a664efe6ee0f4cf09bbfba76665
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8732E93261DAC199E6B1BB60E4513EBB3A4FBD9740F401136E68DC6AAADF3CD544CB40

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: QueryValue$Globalwsprintf$AllocFree
                                                                                                                                                                                                                                                      • String ID: \StringFileInfo\%04x%04x\FileDescription$\StringFileInfo\%04x%04x\ProductVersion$\VarFileInfo\Translation
                                                                                                                                                                                                                                                      • API String ID: 839831799-227869778
                                                                                                                                                                                                                                                      • Opcode ID: a9afd9cb9b9289057acc9d8dcb27ccb20bea6f7cc87a958d0be7342b61cb1e98
                                                                                                                                                                                                                                                      • Instruction ID: bc1b0f72385f3ebc1c5aa09e2429027766c848196011a509b0da76f867b29a07
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a9afd9cb9b9289057acc9d8dcb27ccb20bea6f7cc87a958d0be7342b61cb1e98
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B0513B6261CA8692DB60FB15E0547BAA7A0FBC9784F405032EA8EC3A79DE3CD545CB00

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateInitializeInstance
                                                                                                                                                                                                                                                      • String ID: SearchApp.exe$SearchHost.exe$SearchUI.exe$ShellExperienceHost.exe$StartMenuExperienceHost.exe$explorer.exe
                                                                                                                                                                                                                                                      • API String ID: 3519745914-3335880049
                                                                                                                                                                                                                                                      • Opcode ID: e9f61415fa295ad045d94bcece110d070d92e1117c06e7e255e3f311c7c8884c
                                                                                                                                                                                                                                                      • Instruction ID: 197f23a50329f14ed5e07674f0eaba9ecc7270dcc0e2e9031a77a8702496ba56
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e9f61415fa295ad045d94bcece110d070d92e1117c06e7e255e3f311c7c8884c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D9E1E63660DBC595DAB0AB15E4953EAB760FBC9780F409036DA8D87B6AEF3CD444CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$CreateInstance
                                                                                                                                                                                                                                                      • String ID: CoCreateInstance+CLSID_AppVisibility+IID_IAppVisibility$CoInitialize+Init+Failed${"app" : {"hide_window": "menu_search"}}${"app" : {"hide_window": "menu_store"}}${"app" : {"menu_store" : {"top":%d,"left":%d,"bottom":%d,"right":%d}}}${"app" : {"show_window": "menu_store","menu_store" : {"top":%d,"left":%d,"bottom":%d,"right":%d}}}
                                                                                                                                                                                                                                                      • API String ID: 63071249-2706694235
                                                                                                                                                                                                                                                      • Opcode ID: ccf33f0b89ee57e7251ad08b1552133a116e77885736e999a84b61d10f524417
                                                                                                                                                                                                                                                      • Instruction ID: 9e6357b87d48194e271ba03b71fe877c3c0e5eb9673abe800bc1936c1c227ff0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ccf33f0b89ee57e7251ad08b1552133a116e77885736e999a84b61d10f524417
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 37D1C532A1DAC295DA71BB14E4913EBB3A4FBC9740F404136E68D87B6AEF2CD554CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseFileModuleNameOpenValue
                                                                                                                                                                                                                                                      • String ID: PCAppStore$Software\PCAppStore$status
                                                                                                                                                                                                                                                      • API String ID: 1392962279-3586994989
                                                                                                                                                                                                                                                      • Opcode ID: ac43be4d51741594d32433d1a67c776663e9781f19dead9bcbc265aa2b160293
                                                                                                                                                                                                                                                      • Instruction ID: 013fc88ef857429456ac5230213cc34a55dbaa060db5476bba56c56f9c0d0e82
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ac43be4d51741594d32433d1a67c776663e9781f19dead9bcbc265aa2b160293
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4D51C97261DB819AD660FB24E4913ABB764FBC9780F405136E68D83B69EF3CD544CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateEvent$ChildDesktopDirectoryEnumInitializeOpenWindowWindows
                                                                                                                                                                                                                                                      • String ID: ClosingEvent$DEBUGSCREEN_EVENT$\download
                                                                                                                                                                                                                                                      • API String ID: 1307747073-3079862309
                                                                                                                                                                                                                                                      • Opcode ID: 10d413dc8df6639c5fa448d167195f6fac4a7b449c796c4a8671bd751e444177
                                                                                                                                                                                                                                                      • Instruction ID: 54883770299da171391feeb8fa3da1f872f43f99a4650c8e0c3d44f6e62fc3df
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 10d413dc8df6639c5fa448d167195f6fac4a7b449c796c4a8671bd751e444177
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 78A2E73260DFC585DA70AB19E8953EBA364FB89785F001535DA8D87BAAEF3CD154CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,00000001,00007FF64BACFE31,?,?,?,?,?,?,?,?,00007FF64BAC8BFE,?,?,?), ref: 00007FF64BAE0A0B
                                                                                                                                                                                                                                                      • FlsGetValue.KERNEL32(?,?,00000001,00007FF64BACFE31,?,?,?,?,?,?,?,?,00007FF64BAC8BFE,?,?,?), ref: 00007FF64BAE0A20
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,00000001,00007FF64BACFE31,?,?,?,?,?,?,?,?,00007FF64BAC8BFE,?,?,?), ref: 00007FF64BAE0A41
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,00000001,00007FF64BACFE31,?,?,?,?,?,?,?,?,00007FF64BAC8BFE,?,?,?), ref: 00007FF64BAE0A6E
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,00000001,00007FF64BACFE31,?,?,?,?,?,?,?,?,00007FF64BAC8BFE,?,?,?), ref: 00007FF64BAE0A7F
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,00000001,00007FF64BACFE31,?,?,?,?,?,?,?,?,00007FF64BAC8BFE,?,?,?), ref: 00007FF64BAE0A90
                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(?,?,00000001,00007FF64BACFE31,?,?,?,?,?,?,?,?,00007FF64BAC8BFE,?,?,?), ref: 00007FF64BAE0AAB
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Value$ErrorLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2506987500-0
                                                                                                                                                                                                                                                      • Opcode ID: af887c8c93cbc43d96560930c8f2c244cd7476a811d161b51d2ab35d3cffc2b5
                                                                                                                                                                                                                                                      • Instruction ID: 36dc3a6c637afd81219a9c0336bc81bb3839aa5a02ea31feab00c1a34df26f75
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: af887c8c93cbc43d96560930c8f2c244cd7476a811d161b51d2ab35d3cffc2b5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 68216A20A8C24646FA39B771D55217D62A2DF8CBB0F044634D96EC7EF6DE2CB4814320
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message$MetricsSystem
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 2388057244-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: cca869797438b31eb8facd3317cb589d6587005e4eef270a41aee582d9d839c9
                                                                                                                                                                                                                                                      • Instruction ID: 01da615f620021cbadbf4cde6ca75d2267c33d3b04439cfb2bea1be9ccbdae18
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cca869797438b31eb8facd3317cb589d6587005e4eef270a41aee582d9d839c9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3E01EC7261C7448BE764AF20E55836AB7A1F78E744F405139E68E46BA8DFBDC508CF00
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: e35f4f34488456ced0f6fb02eac88d527095ed97f95edaff96465174b2413dc9
                                                                                                                                                                                                                                                      • Instruction ID: b5e6348118249719f3ab8d0865d9a20f9d1b79043d271615cfbfa86169437b6d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e35f4f34488456ced0f6fb02eac88d527095ed97f95edaff96465174b2413dc9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B7C1E87260DA8595DA60FB25E4403EAB7A0FBCA790F504136E69D83BBADF7CD544CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                                      • String ID: Software\PCAppStore$status
                                                                                                                                                                                                                                                      • API String ID: 3677997916-3794422696
                                                                                                                                                                                                                                                      • Opcode ID: efb4bfaf69d025b927c3919d006ab5e97d401c4810abae94c0a9b080d379a66f
                                                                                                                                                                                                                                                      • Instruction ID: 93ae8b75dd4c830feaf83e1c8cafe39ccf9976b03139c69cb3e920935ac8a800
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: efb4bfaf69d025b927c3919d006ab5e97d401c4810abae94c0a9b080d379a66f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BF61A43261DAC199DA60AB14E4913EBB3A4FBC9780F405136E68D83BA9EF3CD554CB40
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d7b4d00dbc8388a9b12d4b0d012e868a60692be70ab8a079784b9690bbb137de
                                                                                                                                                                                                                                                      • Instruction ID: 5229e8de68beb36139616088a1cf82657de34075f8cd5f42979229d06f7397b3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d7b4d00dbc8388a9b12d4b0d012e868a60692be70ab8a079784b9690bbb137de
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 94C1F322A4C68692E761BB15E4403BE3B61FF99B80F590131DA4E877B1DF7CE884C720
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd$Taskbar
                                                                                                                                                                                                                                                      • API String ID: 0-1897506974
                                                                                                                                                                                                                                                      • Opcode ID: 49de7bddd30700ffc58c29531e65d2e459041191d49c2045cd108c617bfab32f
                                                                                                                                                                                                                                                      • Instruction ID: 68b94b454efa3f78ad52f2098f4fc14333e23b9e1f015894387d108dccffb6a4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 49de7bddd30700ffc58c29531e65d2e459041191d49c2045cd108c617bfab32f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2B22D33261DA8196E660FB15E4912EAB7A0FBC9740F405536E6CDC3BAAEF3CD544CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: System$Metrics$FromInfoMonitorParametersPoint
                                                                                                                                                                                                                                                      • String ID: (
                                                                                                                                                                                                                                                      • API String ID: 865970660-3887548279
                                                                                                                                                                                                                                                      • Opcode ID: 13e12977f7533f15ef69eddcbbfc0fd0c8348206ac9712c3fd55c20fe7d31477
                                                                                                                                                                                                                                                      • Instruction ID: b3db1f8c96e3dd9e956934ef2aac1cb5c136cdf8403fd4debf04b4bad6ddb721
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 13e12977f7533f15ef69eddcbbfc0fd0c8348206ac9712c3fd55c20fe7d31477
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B631507290C685CAD765BB25E05012ABBA1FB89B94F008135E68EC3B65CF3DD6818F15
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseEventHandleObjectOpenSingleWait
                                                                                                                                                                                                                                                      • String ID: ClosingEvent
                                                                                                                                                                                                                                                      • API String ID: 1727428665-2998232585
                                                                                                                                                                                                                                                      • Opcode ID: 1053212c9db2f82abfb25b38c7d15209895087dec2426bbbfa6121425564d087
                                                                                                                                                                                                                                                      • Instruction ID: 0df27cd618bd68f9314e37ed73ead4fd681e794e460686a5ec3fb64e36ca2591
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1053212c9db2f82abfb25b38c7d15209895087dec2426bbbfa6121425564d087
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 48313E3291CA8196E660BB21E4913ABB7A1FBC9380F505536F68D82B79DF3CD545CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00007FF64BAF3181), ref: 00007FF64BAE6AA0
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00007FF64BAF3181), ref: 00007FF64BAE6B2B
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ConsoleErrorLastMode
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 953036326-0
                                                                                                                                                                                                                                                      • Opcode ID: c036e56a59628b86c18341a9c02e7de676271cae1522afdd6599a2391acaaf31
                                                                                                                                                                                                                                                      • Instruction ID: e1b2b39333e94dc1d7ed7dd99167fc888e5b0953689f1e333c0e5ca4c2a02c37
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c036e56a59628b86c18341a9c02e7de676271cae1522afdd6599a2391acaaf31
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2991C462F4C65285F760BF69D4502BD2BA0FB49B88F584539DE0E97AA4DF38E4C1C720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCreateErrorFreeHandleLastLibraryThread
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3065451008-0
                                                                                                                                                                                                                                                      • Opcode ID: 98fd7ff7b0ded043c1c8bd62d9dc79a70e5c77a2b738dab7989ce3feaa60c173
                                                                                                                                                                                                                                                      • Instruction ID: a38273101abe66c84570872ed10ef09953d0dd3856c9ab8de125f217c2995ed0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 98fd7ff7b0ded043c1c8bd62d9dc79a70e5c77a2b738dab7989ce3feaa60c173
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C9213925B0DB8286EA15FB66E450179B3A0FF8DB84F084535EE4E83B66DF3DE4848610
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateInitialize$FileIcmpInstanceSecurity
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 897544864-0
                                                                                                                                                                                                                                                      • Opcode ID: e4a8fba4a3a2cf6652689b814b655aac69ce770b39fc8cbd7eb8e22504de9c34
                                                                                                                                                                                                                                                      • Instruction ID: 6c280233aaa34dc087bdd25c06ef8a60f99f5dd1cc72793de48ee5b27f6e62b6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e4a8fba4a3a2cf6652689b814b655aac69ce770b39fc8cbd7eb8e22504de9c34
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 51312432A0CB8982EB10EF26E45536E7761FB86B58F104135E99D47BA5CF3DE0448B00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$CreateQueryValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2495337196-0
                                                                                                                                                                                                                                                      • Opcode ID: 96195a7c97848da1d77ab3426f6f75efb8691eeffdb334130dcc645515b0f2e7
                                                                                                                                                                                                                                                      • Instruction ID: f928ba5b04e5785d5fb0867d75ca2edfa30b32ed5bd412e4fcfdaebb3ca0b369
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 96195a7c97848da1d77ab3426f6f75efb8691eeffdb334130dcc645515b0f2e7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 03219A3292DB8186DA50BB25E49416FB7A4FBCA780F101036F6CE87A7ADF3CD4549B40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegCreateKeyW.ADVAPI32 ref: 00007FF64B9325CE
                                                                                                                                                                                                                                                      • RegSetValueExW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF64B8CF86D), ref: 00007FF64B93261A
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF64B8CF86D), ref: 00007FF64B932629
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF64B8CF86D), ref: 00007FF64B932657
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$CreateValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1009429713-0
                                                                                                                                                                                                                                                      • Opcode ID: afaa129ba2b9e17a96cafe80f4d355de79babfd96263a463f4b651ecabceec53
                                                                                                                                                                                                                                                      • Instruction ID: 811d4a9e50ce79194718c2f9f9008610a7b46fee59e92fa3cab3754a7d83d80b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: afaa129ba2b9e17a96cafe80f4d355de79babfd96263a463f4b651ecabceec53
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1421BB3291CA8186DA50BB26E49026FB760FBCA784F101436F6CE87A7ADF3CD4449B40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseOpen
                                                                                                                                                                                                                                                      • String ID: registry was not opened
                                                                                                                                                                                                                                                      • API String ID: 47109696-1342567452
                                                                                                                                                                                                                                                      • Opcode ID: 067907fc8f543bc1f2be4a343745e0e14ada7d80e169db747d1a2db14da4985a
                                                                                                                                                                                                                                                      • Instruction ID: 4b5147dcf6a66726edb87543a152c8219592c637dcc60e083dbbbd4e142aee7f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 067907fc8f543bc1f2be4a343745e0e14ada7d80e169db747d1a2db14da4985a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CE51D57261DAC195DA60FB25E4913AAB3A0FBC9780F405036EACD83B6ADF3CD554CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Http$OpenTimeouts
                                                                                                                                                                                                                                                      • String ID: WinHTTP 1.0
                                                                                                                                                                                                                                                      • API String ID: 3926271993-2851767304
                                                                                                                                                                                                                                                      • Opcode ID: 09fa952aa977d0558df61ac88b23ebaea55537f54b3a05465df767db54d51df2
                                                                                                                                                                                                                                                      • Instruction ID: 3beecd452b931e737990999d09c4049a1ea8aa3e93b17f2ed46efb1a8a01687f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 09fa952aa977d0558df61ac88b23ebaea55537f54b3a05465df767db54d51df2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E31193262CA8186E610FB15E4807ABB7A1FBC9784F405035F68E87BA9DF7CD444CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCreateQueryValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4083198587-0
                                                                                                                                                                                                                                                      • Opcode ID: e6e7dc30f0810ce42f1f2f62c42acde2f2de0f07fa5ec146ca2a79758df67c51
                                                                                                                                                                                                                                                      • Instruction ID: fecd0676cceab9dae2a227733c5c59de45af9b3bbc40b32e00ebf3459f06ecae
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e6e7dc30f0810ce42f1f2f62c42acde2f2de0f07fa5ec146ca2a79758df67c51
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0F31093261DA8186DA50FB21E4916ABB360FBC9780F505536F6CD83B6ADF3CD404CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ChangeCloseExceptionFileFormatHeaderMessageNotifyRaiseValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2359320287-0
                                                                                                                                                                                                                                                      • Opcode ID: 1d84e24ea1a41a72f41a824b2c57889b68c9d91562dae07aab841055bba38da3
                                                                                                                                                                                                                                                      • Instruction ID: d8eb7eb86df8898207ca2137b246548e160298e6459e1d38f420af4713b33a78
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1d84e24ea1a41a72f41a824b2c57889b68c9d91562dae07aab841055bba38da3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5F212C7261CA8186E720EB15E44436AB7A0F7CA788F508435E68C83BB9DF7DD549CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: EventOpen
                                                                                                                                                                                                                                                      • String ID: DEBUGSCREEN_EVENT
                                                                                                                                                                                                                                                      • API String ID: 3658969616-491765807
                                                                                                                                                                                                                                                      • Opcode ID: e9ecb541bfec36b6bd037ab5115ca9dee5ae7b67843e05f2a2d7245eaeafdd25
                                                                                                                                                                                                                                                      • Instruction ID: 0c3f40c870d915a68d3a384d3d00ea888fbdd897f65f1cd9b42f473c4885c487
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e9ecb541bfec36b6bd037ab5115ca9dee5ae7b67843e05f2a2d7245eaeafdd25
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0151083261DAC695DA60FB15E4913EBA360FBC9780F405036E6CD87BBADE2CD515CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateProcess
                                                                                                                                                                                                                                                      • String ID: h
                                                                                                                                                                                                                                                      • API String ID: 963392458-2439710439
                                                                                                                                                                                                                                                      • Opcode ID: 4425c04c5f0eedab8ae0265d447e70cf76a5286354d0daf94f6f6e9a40669210
                                                                                                                                                                                                                                                      • Instruction ID: 00777c807bbb9159c4fc5763b9c2580a5e622dc9b3eef245a90145c67e2928e0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4425c04c5f0eedab8ae0265d447e70cf76a5286354d0daf94f6f6e9a40669210
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: ED21C63251CA8296E750EB54E4913AFB7A0F7D9344F504039F68D82AAADFBCD558CF40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: QueryValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3660427363-0
                                                                                                                                                                                                                                                      • Opcode ID: 8255e4681818947f7ead3aea93db6fb5ee972568b12f96a755b376553cfc7fd9
                                                                                                                                                                                                                                                      • Instruction ID: 853aa880cbb85634f07b5e8a18cfc1801b4a94274778651ac31385e0a1b83de2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8255e4681818947f7ead3aea93db6fb5ee972568b12f96a755b376553cfc7fd9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0321FD7262DB8186DA60AB19E48466AB3E4FB89B94F502135FACD43B78DF3CD444CF10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetEnvironmentStringsW.KERNEL32(?,?,00000000,00007FF64BADE092,?,?,?,00007FF64BADE586,?,?,?,?,00007FF64BAD7D64,?,?,?), ref: 00007FF64BAEBBE0
                                                                                                                                                                                                                                                      • FreeEnvironmentStringsW.KERNEL32(?,?,00000000,00007FF64BADE092,?,?,?,00007FF64BADE586,?,?,?,?,00007FF64BAD7D64,?,?,?), ref: 00007FF64BAEBC4A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: EnvironmentStrings$Free
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3328510275-0
                                                                                                                                                                                                                                                      • Opcode ID: 77585319db204b116c1fc42361d63d9013bd927e5b8f2a575e04e909fa60f02f
                                                                                                                                                                                                                                                      • Instruction ID: a1d953fb813fb091dbadcb2e8a83c2909d895d943839e2decf65862d30a15ee1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 77585319db204b116c1fc42361d63d9013bd927e5b8f2a575e04e909fa60f02f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2401A511E4C75581EA20BB12E44506E6360EB5DBE0F884630DF6E53BE9DE2CE8828350
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AttributesEnvironmentExpandFileStrings
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3836626501-0
                                                                                                                                                                                                                                                      • Opcode ID: cf2b42f781f452ba8887e965ace6311404eaabd47bc012664cabe273c61bef76
                                                                                                                                                                                                                                                      • Instruction ID: cb5cfeae3fe268fa91b9cb6c084d921e373d6f241f80c47dfd12b19ff22938a5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cf2b42f781f452ba8887e965ace6311404eaabd47bc012664cabe273c61bef76
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 43F01231E2C54282E6B4B724E4457BA6250FB8A754FA40631E9ADC65E5DF2CD5458B00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorFreeHeapLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 485612231-0
                                                                                                                                                                                                                                                      • Opcode ID: b14f49c57cee8635011c431eaae8e23fe290bbf5ee1f602fc278b6c7871e509f
                                                                                                                                                                                                                                                      • Instruction ID: 027c5e600f8e5e9a11c5a4d3efafcae1e9cd414bf9b7c2a9f95a05b14f85161c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b14f49c57cee8635011c431eaae8e23fe290bbf5ee1f602fc278b6c7871e509f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A3E01251F0D54682FE69BBF2D8555791261AF9DB40F084030D90DD3AB2EE2CA5D44250
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$ShowUpdate
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2310006639-0
                                                                                                                                                                                                                                                      • Opcode ID: 27d96b2e2a6ebb7af6f79fd039629226fea3c2d1ac42639d18c704751faeff7c
                                                                                                                                                                                                                                                      • Instruction ID: dbc893cd9dfe6348693ed94a1f6ed5f522d26ee89a471513b3fc114700b05b72
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 27d96b2e2a6ebb7af6f79fd039629226fea3c2d1ac42639d18c704751faeff7c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 32E09A66A29B8582DB50AB16D89522967A0F7C9B81F459021EA4E83774DF38C4558700
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ChildDesktopEnumWindowWindows
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2514311848-0
                                                                                                                                                                                                                                                      • Opcode ID: b0fd43d6e0e94c28da821d992680c33c943c97e8262ce344efbf5b071f0ff684
                                                                                                                                                                                                                                                      • Instruction ID: 60816158375774bfbba8dbf5b448dc2b1e9f0b88ca38f542ed435b8448b8467b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b0fd43d6e0e94c28da821d992680c33c943c97e8262ce344efbf5b071f0ff684
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EEC01265E1E746C1DA147B65E8991343360BF4F781FD09030C40D41A308E2C905D8B00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ChildDesktopEnumWindowWindows
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2514311848-0
                                                                                                                                                                                                                                                      • Opcode ID: 815231a326fdbdcc2087a3ba038e825c9bf287463471365a8762f450db156d53
                                                                                                                                                                                                                                                      • Instruction ID: ca929088cd95fb479e7586471187cfadbc8d9d2a144245ff347b12292e5edf04
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 815231a326fdbdcc2087a3ba038e825c9bf287463471365a8762f450db156d53
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 53C01265E1E706C1DA147F75F8991343360FF5F781FD09030C40D41A308E2C9059CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: TextWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 530164218-0
                                                                                                                                                                                                                                                      • Opcode ID: 0cf2a0489d4b6d7020a5c22c37947fe0ccb033086997616492718bf81921ff99
                                                                                                                                                                                                                                                      • Instruction ID: 3f92ea821ce34398ba377f7fbe64b1754ea31906aa9b8ad8fcfd56a9df8e8f83
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0cf2a0489d4b6d7020a5c22c37947fe0ccb033086997616492718bf81921ff99
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E241FB3261CA818AE660FB25E4513ABB7A5FBC9384F401136E6CDC6AA9DF7CD504CF00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ObjectSingleWait
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 24740636-0
                                                                                                                                                                                                                                                      • Opcode ID: 663fe9c381e483fa1501adddf12d36106911a8cdb38d341f4e397698b9c45a6a
                                                                                                                                                                                                                                                      • Instruction ID: 6464c297fd4ce4f06bee180f80dbab41a963f88040ddc8ff9d2c5a783574fa6e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 663fe9c381e483fa1501adddf12d36106911a8cdb38d341f4e397698b9c45a6a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BA314161E0C68687EE20BB29E44527E63A2FFC9784F500535EA8D877B6DE3CD5528B04
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ChangeCloseCreateEventFormatMessageNotifyValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3644647982-0
                                                                                                                                                                                                                                                      • Opcode ID: d131e54128c23b049350c72a160e8f6a443448de3b4584595088c6dbcf7bcdaa
                                                                                                                                                                                                                                                      • Instruction ID: 913d80ad25a8ac3629e6a7ac426901787bae0aef1c12eada693efd4ab5c64700
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d131e54128c23b049350c72a160e8f6a443448de3b4584595088c6dbcf7bcdaa
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5331C47661DB8585DAA0EB29F88439FB7A0F7D8780F105126EACD83B69DF3CD0558B40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Initialize
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2538663250-0
                                                                                                                                                                                                                                                      • Opcode ID: 56cb18ff6626b283ffe465cba34704dc4daad80764cd781178f4e76e5ddfb6ff
                                                                                                                                                                                                                                                      • Instruction ID: 2d3288ad280357b9e153a770748784fd055d890f875d7dd284eb3954086915b2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 56cb18ff6626b283ffe465cba34704dc4daad80764cd781178f4e76e5ddfb6ff
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D321E672A1CA4183EA10FB29E44116AB7A5FBC9794F504536EACD83B7ADF3CD1528B04
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FreeTask
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 734271698-0
                                                                                                                                                                                                                                                      • Opcode ID: 1390414adff6cff9572c19d13d4af55dc9366da79f4f2d16f28cb309ed5a3294
                                                                                                                                                                                                                                                      • Instruction ID: 9da58762f745cfe9ec5b2ff7136b392b9cc8209f108d499a3a3975de6a20ad96
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1390414adff6cff9572c19d13d4af55dc9366da79f4f2d16f28cb309ed5a3294
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3411E97252CA45C6D720FB16F45565AB361FBC8744F401132F68D86A69DF7CD544CF40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00007FF64BAE0E10: HeapAlloc.KERNEL32 ref: 00007FF64BAE0E4E
                                                                                                                                                                                                                                                      • RtlReAllocateHeap.NTDLL(?,?,00000000,00007FF64BADA6A3,?,?,?,00007FF64BAE01A3,?,?,?,00007FF64BAE0099,?,?,?,00007FF64BAE047A), ref: 00007FF64BAE5B4D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Heap$AllocAllocate
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2177240990-0
                                                                                                                                                                                                                                                      • Opcode ID: d1f4e796e73a478c92420ccbb471beedb7c10c5d4cbfa91b2b710b1e4cfc076d
                                                                                                                                                                                                                                                      • Instruction ID: cc48ec9081541c88eca1eed05df4be949b2dca8b3afc5b86fe56b5213b927c77
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d1f4e796e73a478c92420ccbb471beedb7c10c5d4cbfa91b2b710b1e4cfc076d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0901FB10F5C64781FAA4BB65FA5137E5191DF9D7A0F088631DD2DC66E2EE6CE8C08231
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FromMonitorPoint
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1566494148-0
                                                                                                                                                                                                                                                      • Opcode ID: 9c796e21bcbbd32d9733918cfdc4da3585dd35d9ebd39644cbc39d00fd814335
                                                                                                                                                                                                                                                      • Instruction ID: 4929f93f993eb24a5b0e09efab68b5d3c450dd22cf3407c9db31fed1c46112ec
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9c796e21bcbbd32d9733918cfdc4da3585dd35d9ebd39644cbc39d00fd814335
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 90F0FF32928E8586D212EF24E45025BF771FFDA784F105326F28E56929DF3DD5818B40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: QueryRecycle
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2469249176-0
                                                                                                                                                                                                                                                      • Opcode ID: 934cc2852b4868eeabf2003547c0e9231da6ab5e154a758072a7bf41caf7e24a
                                                                                                                                                                                                                                                      • Instruction ID: 320ca4279e2517b5165e27ff888241f6a46944e11b9f9e527dda8d5748877b2d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 934cc2852b4868eeabf2003547c0e9231da6ab5e154a758072a7bf41caf7e24a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C5F01221D1CB8A92DA95BF10E4403EA6361FB9B740FA05430E54EC29A5DF3CD5059B10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: EnumWindows
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1129996299-0
                                                                                                                                                                                                                                                      • Opcode ID: dbb1f573b530a87190cc711aa1b050e54dc1485b87a9a9082699a202dfc258a2
                                                                                                                                                                                                                                                      • Instruction ID: 7c733f91d1f94976ff0f5adf61b3eb25b1e229a31fcdc3a0518a8feed6ce920a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dbb1f573b530a87190cc711aa1b050e54dc1485b87a9a9082699a202dfc258a2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D1F0FEB291C64692EB20FF14E44116ABB64F7CD398F440221E68DC6A7ADF6CD649CF00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateInstance
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 542301482-0
                                                                                                                                                                                                                                                      • Opcode ID: 82772c17aba477afe5628f88038786c146a768299862a8ae95623a60e00681d5
                                                                                                                                                                                                                                                      • Instruction ID: d031431ceab356b87602d649b201016e7496741c4ecd66b6dbdce4dabd26aeb3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 82772c17aba477afe5628f88038786c146a768299862a8ae95623a60e00681d5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 36E05A76A18B84C2C620EB55F84005ABBA4FB9A794F504526EAC842B28CF7CC165CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FreeHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3298025750-0
                                                                                                                                                                                                                                                      • Opcode ID: 126b51d66330d529f4528cffcfa2f01f0942d41847845eb93ade80c07f1744cd
                                                                                                                                                                                                                                                      • Instruction ID: 16a4703f6d27fa292523f4b3461577f2dbf4c9cb4b7ce77ee5b93db90578142f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 126b51d66330d529f4528cffcfa2f01f0942d41847845eb93ade80c07f1744cd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 24E0EC7290DB8181D714EB15E44435ABBB0F7C9780F508125EBCC82B38DF3CC495CA00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileFindNext
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2029273394-0
                                                                                                                                                                                                                                                      • Opcode ID: 065cdcbe97f106e0eade9506be4ef307043f165ef828597f3074fb4363c91a61
                                                                                                                                                                                                                                                      • Instruction ID: a19e86fa558770fcd8bb37b6d7be5d01ccb021b2cabe2a92376dad73b0d0227c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 065cdcbe97f106e0eade9506be4ef307043f165ef828597f3074fb4363c91a61
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 52C04814F2EA43C2E6683B629D8263212A0BB4E700F944030C118C0A60DE2CA1F68A22
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(?,?,00000000,00007FF64BAE0BD6,?,?,?,00007FF64BAC90F9,?,?,?,?,00007FF64BAE0E08), ref: 00007FF64BAE0DB1
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4292702814-0
                                                                                                                                                                                                                                                      • Opcode ID: 5ad3a28724de0d7eae44d08b4466c8c7512d1d24c667bf16be5eedaba0a8cd6e
                                                                                                                                                                                                                                                      • Instruction ID: be62f35406559742ae41d89796a3da813a409bd732e8f4eddec85b996038d593
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5ad3a28724de0d7eae44d08b4466c8c7512d1d24c667bf16be5eedaba0a8cd6e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5BF03714B4D60241FE687A76D8923BA52999F9DB40F184430C80EC6AE6DE1CF4C58630
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4292702814-0
                                                                                                                                                                                                                                                      • Opcode ID: 1ab3abee0b0df280f6ea689347e8a0d30cae0e72a40c9bae681347ef5c9e1206
                                                                                                                                                                                                                                                      • Instruction ID: 24cf2462acb803f7b26dce5d11125ed91dcd85ccd49a54b48b7f8f17fb119dc5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1ab3abee0b0df280f6ea689347e8a0d30cae0e72a40c9bae681347ef5c9e1206
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 67F08C11F4D20285FA747B71E94227E5192DF8DBA0F084A34DC2EC6AE2DE2CE4C18230
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 626452242-0
                                                                                                                                                                                                                                                      • Opcode ID: 0b0b72c7a2bbd2b06bfd941d9483a5493affec11b1419866e72d6a85d5fe652c
                                                                                                                                                                                                                                                      • Instruction ID: e09aa53cf134474cb4f32b909183b71ac2e935c71acc954319ec64008646ecea
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0b0b72c7a2bbd2b06bfd941d9483a5493affec11b1419866e72d6a85d5fe652c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 50D05E31A0CE8186DB20BB75E45935A6BA1FBC9368F504624E6EA4BAF4DF7CC0458B40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4292702814-0
                                                                                                                                                                                                                                                      • Opcode ID: 64d30b65498477a3495af4626b3c505657476d8f41d5f7a5527f686b3be6af0a
                                                                                                                                                                                                                                                      • Instruction ID: 002e6616635cde6e95e8e71cd3b1a2f6f3dd982ec81a949c1c104e945cf04039
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 64d30b65498477a3495af4626b3c505657476d8f41d5f7a5527f686b3be6af0a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 26D0C771919F80C1C604EF16F840019B7A0FBCD784F409425E68D43734CF38C0958B00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Uninitialize
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3861434553-0
                                                                                                                                                                                                                                                      • Opcode ID: 63a70c0b2080d31044b73d5fc0420380379576a7f457e1623dfecf2492aaa18f
                                                                                                                                                                                                                                                      • Instruction ID: 955776a0296964a1b486cd467c9783d284046d232e98f03ad726d8f09d6a88cb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 63a70c0b2080d31044b73d5fc0420380379576a7f457e1623dfecf2492aaa18f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 89B01225D19645C1C5143B75E88A0182220B79F301FA0C030C148005208E2C40AE4B00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Sleep$FileTick$CountCount64DeleteDownload
                                                                                                                                                                                                                                                      • String ID: %s%s%s%s%s%s%s%s&%s%s%I64u$%ws\%ws$&evt_action=$&evt_src=fa_$&nocache=$&version=$00000000-0000-0000-0000-D05099DB2397$https://pcapp.store/pixel.gif?guid=$temp_event
                                                                                                                                                                                                                                                      • API String ID: 3246919792-2080569349
                                                                                                                                                                                                                                                      • Opcode ID: 9cf7ce4103778ffd95a6b869b196e99e7f71f4234325332f1a56c721305aeb39
                                                                                                                                                                                                                                                      • Instruction ID: aa8edd3755c76b2af763a9d6e1debfe166da6bc63e9fbbf1d8cfd32851f87263
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9cf7ce4103778ffd95a6b869b196e99e7f71f4234325332f1a56c721305aeb39
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3502A23254DBC295EA70BB14E4903EAB3A4FBC9740F405536E68D82B6AEF3CD554CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$ErrorFileFindHandleLast$AttributesFirst
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2606427991-0
                                                                                                                                                                                                                                                      • Opcode ID: 355334dcceae02b49ab9097a0ac3bef8698e95b7cc128a7e9a7f23a438070136
                                                                                                                                                                                                                                                      • Instruction ID: 3a0fc5ae3c94b71ca2fcd5c3136803011072cabae2dc1e5cc33fa87f965c66c8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 355334dcceae02b49ab9097a0ac3bef8698e95b7cc128a7e9a7f23a438070136
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A2917031A0CA0246E675BB25E85467A6390EF4E7B0F144731D9BE87AF4DE3CE4858B20
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1239891234-0
                                                                                                                                                                                                                                                      • Opcode ID: eb1eff54664d364fffe93d0073cbebfe185a6b11e3a872ea97b0a0592c0c5c65
                                                                                                                                                                                                                                                      • Instruction ID: ee3ae9a35273d75be8f2fc9af577f4f683a044cdbe0e302150577cc9ffab8937
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eb1eff54664d364fffe93d0073cbebfe185a6b11e3a872ea97b0a0592c0c5c65
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BE316132618B8185EB60EF25E8402BE73A4FB9D754F540136EA9D83BA5DF3CC595CB10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF64BAA12D7
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                                                                                                                                                                                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                                      • API String ID: 3511171328-631824599
                                                                                                                                                                                                                                                      • Opcode ID: 536e1cbde581abdcf4f6eeb0427798af8337269c14b6612caf455d91a3591f50
                                                                                                                                                                                                                                                      • Instruction ID: f7f82f756f6fd852a41eaea2e5433b240d75b6a5ab10c1f7e6c2ea9b95ec2048
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 536e1cbde581abdcf4f6eeb0427798af8337269c14b6612caf455d91a3591f50
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 88113A32A18B42A6F714BB22E6553B933A4FF49754F404135C64DC2AA0EF3CE4B8C724
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Locale$Info$DefaultLanguageNameUser
                                                                                                                                                                                                                                                      • String ID: unknown
                                                                                                                                                                                                                                                      • API String ID: 467829892-2904991687
                                                                                                                                                                                                                                                      • Opcode ID: ae1f3f86b27aa6135cee2ff20fb8959bfd4e78bfbfa72571573a6ae8d738cb51
                                                                                                                                                                                                                                                      • Instruction ID: 0f536d8091d6eb768efca42c0b48ea502c32c8ba071a07dfa19d65013576c34c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ae1f3f86b27aa6135cee2ff20fb8959bfd4e78bfbfa72571573a6ae8d738cb51
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 39412E3261DA8195E660FB21E4917EBB7A1FBC9780F405136E68D83BBADE2CD544CF40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FormatInfoLocaleMessage
                                                                                                                                                                                                                                                      • String ID: !x-sys-default-locale
                                                                                                                                                                                                                                                      • API String ID: 4235545615-2729719199
                                                                                                                                                                                                                                                      • Opcode ID: 86d9eb462d90a40d0ec9a479c1aed245eb1ae8251b0789d64038f46ad7eeabbd
                                                                                                                                                                                                                                                      • Instruction ID: cc25281c865f193a9554137968f9ba3645be9e4c1d7156ce4df9e6b04fc769eb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 86d9eb462d90a40d0ec9a479c1aed245eb1ae8251b0789d64038f46ad7eeabbd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7001C471B0C78182E720AB16F5547BA6791FB8D784F184035DA4986BA4CF3CD5418B10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(?,?,00000001,00007FF64BAC3A91,?,?,?,?,?,?,00007FF64BAC8DFB), ref: 00007FF64BAC399B
                                                                                                                                                                                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,00000001,00007FF64BAC3A91,?,?,?,?,?,?,00007FF64BAC8DFB), ref: 00007FF64BAC39A4
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,?,00000001,00007FF64BAC3A91,?,?,?,?,?,?,00007FF64BAC8DFB), ref: 00007FF64BAC39AA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled$CurrentProcess
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1249254920-0
                                                                                                                                                                                                                                                      • Opcode ID: a9e53e6157563ca2976ececc9be293e86cc5b76dc47583f9ffc2bdc0c0cb4bbb
                                                                                                                                                                                                                                                      • Instruction ID: 89ca3c31d633d19de8d71810a350323569af4db5d3c5d4d546cbf77d8269b448
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a9e53e6157563ca2976ececc9be293e86cc5b76dc47583f9ffc2bdc0c0cb4bbb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A2D0C961E1C94686FB283B62ED251391221BB9FB51F081434CB0FC6B71ED3C948A8300
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(?,?,?,?,00007FF64B9265D7,?,?,?,?,00007FF64B932083,?,?,?,?,00007FF64B92EDE1), ref: 00007FF64B926699
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(?,?,?,?,00007FF64B9265D7,?,?,?,?,00007FF64B932083,?,?,?,?,00007FF64B92EDE1), ref: 00007FF64B9266A8
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Heap$FreeProcess
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3859560861-0
                                                                                                                                                                                                                                                      • Opcode ID: 1b92dd3fa47805ad4be814b7207d9e358e3daaedac0e0864920ab83c9e0d32b2
                                                                                                                                                                                                                                                      • Instruction ID: b73f4b7463bf042c49b1781a3f54087de70d37bd8e38b836dc62e5256241054a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1b92dd3fa47805ad4be814b7207d9e358e3daaedac0e0864920ab83c9e0d32b2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3EC01211E2E682A0D908B7A2A48B09966A0EBDE340F908034E9489262A8C2C80A20E20
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 96deb49f9c9e0e377063350eb5d5da8a57a3189ba4225a268213569ed96476fb
                                                                                                                                                                                                                                                      • Instruction ID: c71852467e505850e86c56d139034cf957798b7e5be6162bb69e9c3d0117b925
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 96deb49f9c9e0e377063350eb5d5da8a57a3189ba4225a268213569ed96476fb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16C01214F0EA82C1E9283B12E8828391260BF0FB02F846034C00C80770CE2CA1D38B20
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$MetricsSystem$AssocCreateErrorExecuteFocusForegroundLastRectShell
                                                                                                                                                                                                                                                      • String ID: $&eCode=%lu&br=default$C$open$product$showInCurrentBrowser_error
                                                                                                                                                                                                                                                      • API String ID: 2513301302-685431900
                                                                                                                                                                                                                                                      • Opcode ID: 7f209b68ee510be14cf23d43f075100da5d465cf85999d537a5b691567d3c9e0
                                                                                                                                                                                                                                                      • Instruction ID: 351605bb344bd656571dc3798d17fd7f79db7b1047bed6b125dec4ecee393cc6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7f209b68ee510be14cf23d43f075100da5d465cf85999d537a5b691567d3c9e0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E602F93250DAC69AE671FB24E4907EEB365FBCA340F405136D68D82AA9EF3CD544CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Http$CloseHandle$OpenRequest$ConnectCount64ReceiveResponseSendTickTimeouts
                                                                                                                                                                                                                                                      • String ID: GET$WinHTTP 1.0
                                                                                                                                                                                                                                                      • API String ID: 4212831979-1397384856
                                                                                                                                                                                                                                                      • Opcode ID: 30a75dc3898c843e322fef78d88f2628e08c9a268069421ebfdfa7e74275caa6
                                                                                                                                                                                                                                                      • Instruction ID: 3287904faed03e9606ffa82be5a3f10d4b1686b2eb2b1a01ca2013e421a8977d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 30a75dc3898c843e322fef78d88f2628e08c9a268069421ebfdfa7e74275caa6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CE12713660DBC589EAB0AB15F4943EAB3A4F789790F104126DACD83B69DF7CD194CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorExecuteFileLastModuleNameOpenQueryShellValue
                                                                                                                                                                                                                                                      • String ID: $/init %ws /restart$eCode=%lu$open$product$reload_error
                                                                                                                                                                                                                                                      • API String ID: 534767287-2650242239
                                                                                                                                                                                                                                                      • Opcode ID: 1e1a69b9d5a133d9fe8e81c7137a555c9729f0ee08baec9ee7b18c0f352923dd
                                                                                                                                                                                                                                                      • Instruction ID: adcd06a418981186f537a039ceed73278a16db62050b2efaf228425410a64241
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1e1a69b9d5a133d9fe8e81c7137a555c9729f0ee08baec9ee7b18c0f352923dd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0CB1C73261DAC2A5DA70BB64E4913EAB360FBC9340F405536E68D83B7AEE7CD554CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClassCursorLoadRegister
                                                                                                                                                                                                                                                      • String ID: StartReplace
                                                                                                                                                                                                                                                      • API String ID: 1693014935-3907892786
                                                                                                                                                                                                                                                      • Opcode ID: 31b5721278bc1df87b6e51de0ef8ec08d43428c1a1da8ef09b83c844a1edc353
                                                                                                                                                                                                                                                      • Instruction ID: 90dfc85680dfccf4638593c96bb9a25f5b4888e1d5fc556693652091d4f76bf6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 31b5721278bc1df87b6e51de0ef8ec08d43428c1a1da8ef09b83c844a1edc353
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 89A1AF3260DBC599DA61AB29E4903EAB7A5FBC9780F404136DA8D83B69DF3CD544CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorExecuteLastShell$FocusForegroundWindow
                                                                                                                                                                                                                                                      • String ID: $&eCode=%lu&br=%ws$open$product$showInCurrentBrowser_error
                                                                                                                                                                                                                                                      • API String ID: 810458230-1600046415
                                                                                                                                                                                                                                                      • Opcode ID: 9017d61baae88eafe7c2001df7ab307bc4c0607bdfca28fe72645289dcbcf4ec
                                                                                                                                                                                                                                                      • Instruction ID: 6632fd37bcc5f5788b3a7920ce41fb7635f599bccfa21491f19c4ddb2753ee54
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9017d61baae88eafe7c2001df7ab307bc4c0607bdfca28fe72645289dcbcf4ec
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9691C73251DAC695EA60BB24E4913EAB364FBCA340F405536E68D83B7AEF3CD554CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCreateEventQueryValue
                                                                                                                                                                                                                                                      • String ID: RES_COUNT$exit$product$product$reason=%ws$reload${"app" : { "close_app" : 1}}
                                                                                                                                                                                                                                                      • API String ID: 3402758941-3700722040
                                                                                                                                                                                                                                                      • Opcode ID: f457ee87fa4d1ea962be7eac4e2d5b70498fbd24c98dbf47dca13eb6dcd315ac
                                                                                                                                                                                                                                                      • Instruction ID: 94f8c0bc2538c0f8144174bdffd6e9ceff5d4c1b40db2cb1a9cf79e316634ec1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f457ee87fa4d1ea962be7eac4e2d5b70498fbd24c98dbf47dca13eb6dcd315ac
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2902B33661DBC599DA70AB25E4802EAB364FBC9740F405136EACD83B6AEF38D554CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$OpenQueryValue
                                                                                                                                                                                                                                                      • String ID: AppParam$Software\PCAppStore$default
                                                                                                                                                                                                                                                      • API String ID: 1607946009-3084650451
                                                                                                                                                                                                                                                      • Opcode ID: c2a4d91563ea0cc645b7c58ce1aac30b7a98b724c1c5adb5231d6603be1ecbfc
                                                                                                                                                                                                                                                      • Instruction ID: a7195a7a23a21d42c7f9bd150a3150ede444a53df0fd7a349c434cb3a7bbdf57
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c2a4d91563ea0cc645b7c58ce1aac30b7a98b724c1c5adb5231d6603be1ecbfc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E071E93251DAC199E671BB20E4913EBB764FBC9380F405536E68D83AAADF3CD544CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CompatibleCreateObjectSelect$BitmapDelete
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1931044818-3916222277
                                                                                                                                                                                                                                                      • Opcode ID: 35cec4d2eec9fa19ddf4e6ff6404fd960e49ea527ef232a0f76cb1028a1e667a
                                                                                                                                                                                                                                                      • Instruction ID: 864281ae44897eaefcfec6a9c6bfb6adc5426ef1221d6058433db9b71f7da0ac
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 35cec4d2eec9fa19ddf4e6ff6404fd960e49ea527ef232a0f76cb1028a1e667a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F941983661CB858AD760EB26F4843AAB7A1F7C9790F104125EA8D83B79DF7CD444CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00007FF64B932150: RegCreateKeyW.ADVAPI32 ref: 00007FF64B93217A
                                                                                                                                                                                                                                                        • Part of subcall function 00007FF64B932150: RegDeleteValueW.ADVAPI32(?,?,?,?,?,?,?,?,00007FF64B91BC9F), ref: 00007FF64B9321AB
                                                                                                                                                                                                                                                        • Part of subcall function 00007FF64B932150: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00007FF64B91BC9F), ref: 00007FF64B9321BA
                                                                                                                                                                                                                                                        • Part of subcall function 00007FF64B932150: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00007FF64B91BC9F), ref: 00007FF64B9321E6
                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32 ref: 00007FF64B91BE1E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run, xrefs: 00007FF64B91BB5A
                                                                                                                                                                                                                                                      • Software\Microsoft\Windows\CurrentVersion\Run, xrefs: 00007FF64B91BAF3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$CreateDeleteOpenValue
                                                                                                                                                                                                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run$Software\Microsoft\Windows\CurrentVersion\Run
                                                                                                                                                                                                                                                      • API String ID: 2881815620-377293507
                                                                                                                                                                                                                                                      • Opcode ID: 86197440fc59f79d379d350ca35bad24ba17f33e69b337c451b6b54877f8497e
                                                                                                                                                                                                                                                      • Instruction ID: 546c5a4c06a4f65af373c160d74d4cafadec9f906da531e81d33b90174a8da59
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 86197440fc59f79d379d350ca35bad24ba17f33e69b337c451b6b54877f8497e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 31C1B33261DAC199D6B0AB15E4913EBB7A4FBC9780F405126EACD83BA9DF3CD154CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF64BAE3D14,?,?,?,?,00007FF64BADA79D,?,?,?,?,00007FF64BAA13FC), ref: 00007FF64BAE3444
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF64BAE3D14,?,?,?,?,00007FF64BADA79D,?,?,?,?,00007FF64BAA13FC), ref: 00007FF64BAE3450
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressFreeLibraryProc
                                                                                                                                                                                                                                                      • String ID: api-ms-$ext-ms-
                                                                                                                                                                                                                                                      • API String ID: 3013587201-537541572
                                                                                                                                                                                                                                                      • Opcode ID: b900d435430a5f103d2c1bdfa4f2820a536f3b69551882501559dce37074e2bd
                                                                                                                                                                                                                                                      • Instruction ID: 482bfa6205ab02417f92f8df268d1d1ee86e33976e08abd611a64faa32495958
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b900d435430a5f103d2c1bdfa4f2820a536f3b69551882501559dce37074e2bd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3041F721B1DA0285EB27BB16E81497922D0FF4EB90F455135DD1DC7BA4EF3CE4458720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseEvent$CreateOpenValue
                                                                                                                                                                                                                                                      • String ID: DEBUGSCREEN_EVENT$LastID$LastTime$LastTimeContextual
                                                                                                                                                                                                                                                      • API String ID: 526177595-2236634864
                                                                                                                                                                                                                                                      • Opcode ID: 08fde735a46728af729828aa718fa165d32398c21edb1049bcfa11f688156368
                                                                                                                                                                                                                                                      • Instruction ID: 94c4a0216c59036ebe07edff25a63f943a5ec4527a628712ff2dddbb5962487a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 08fde735a46728af729828aa718fa165d32398c21edb1049bcfa11f688156368
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F2E18D3661DFC594DAB1AB15E4803EBB3A5FBC9790F405226DACC83B69EF28D154CB40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CompatibleCreateObject$BitmapDeleteReleaseSelectSleep
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3334454202-0
                                                                                                                                                                                                                                                      • Opcode ID: 32ee0b46500626f0da7ec548e29395de13ae04f49fba90d89cdb007a3d861a92
                                                                                                                                                                                                                                                      • Instruction ID: 7298e827b931ffd2083f695fb5bc6b595ed6720904cf0f810f24444ed50ca9e4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 32ee0b46500626f0da7ec548e29395de13ae04f49fba90d89cdb007a3d861a92
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 92510A3660DB85C5EA60EB15E49076EA7A0F7C9B90F544131DA8E83BB8DF3CC585CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                                                                                                                                                      • String ID: CONOUT$
                                                                                                                                                                                                                                                      • API String ID: 3230265001-3130406586
                                                                                                                                                                                                                                                      • Opcode ID: eddd2493575fffd36178473db237eee3d09d9d22ae17176b1e1a4d61f485cdc8
                                                                                                                                                                                                                                                      • Instruction ID: 5e39bb8b87b64cd41d3e23fec633ffa503a5d697c377a52c2b680a9956596aff
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eddd2493575fffd36178473db237eee3d09d9d22ae17176b1e1a4d61f485cdc8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 82115E21A1CA4186E750BB56E844739A6A0FB9EBE4F444234EA6EC7BB4CF3CD9548740
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiStringWide
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2829165498-0
                                                                                                                                                                                                                                                      • Opcode ID: b6b862448baebf1a13a4e74f695d7dd3fded44265ae353c1136d9be3a601d1a2
                                                                                                                                                                                                                                                      • Instruction ID: 6c5f35b9888aad5554bb3b3cc17d07f9a13ec12af1259f61b90cebe44bc5a5be
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b6b862448baebf1a13a4e74f695d7dd3fded44265ae353c1136d9be3a601d1a2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 93818172A0C74286EB20BF21E54027A72A5FB5C7E4F144635EA5D87BE4DF3CD8858B20
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message
                                                                                                                                                                                                                                                      • String ID: product$start_button_not_created$startbutton_skip_win11_autohide_panel$system_panel_not_found
                                                                                                                                                                                                                                                      • API String ID: 2030045667-76959595
                                                                                                                                                                                                                                                      • Opcode ID: e09413c9c0398569065c9b378703c3e2c0925f81e9efc9774f6fc570466bbe60
                                                                                                                                                                                                                                                      • Instruction ID: 4b9bec0a6a0463c47a236c90dd2ff9abc061a9efa3bd7a971ab9de8bfbf76aa5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e09413c9c0398569065c9b378703c3e2c0925f81e9efc9774f6fc570466bbe60
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2722B63261DAC6A5DA70FB24E4913EAB365FBC9340F405536E68D83B7AEE2CD554CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,00007FF64BAC90F9,?,?,?,?,00007FF64BAE0E08), ref: 00007FF64BAE0B83
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF64BAC90F9,?,?,?,?,00007FF64BAE0E08), ref: 00007FF64BAE0BB9
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF64BAC90F9,?,?,?,?,00007FF64BAE0E08), ref: 00007FF64BAE0BE6
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF64BAC90F9,?,?,?,?,00007FF64BAE0E08), ref: 00007FF64BAE0BF7
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF64BAC90F9,?,?,?,?,00007FF64BAE0E08), ref: 00007FF64BAE0C08
                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(?,?,?,00007FF64BAC90F9,?,?,?,?,00007FF64BAE0E08), ref: 00007FF64BAE0C23
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Value$ErrorLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2506987500-0
                                                                                                                                                                                                                                                      • Opcode ID: 05bacbead67eac003dacf3f6a597402e38fafda3a838cea5dbc72c3fab741a24
                                                                                                                                                                                                                                                      • Instruction ID: a4ca9bfbe2a40ebaeaa43d3e1632dcd2e44a3c54a6db5335bbb54f293f9f8198
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 05bacbead67eac003dacf3f6a597402e38fafda3a838cea5dbc72c3fab741a24
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BA115B20A8C68246FA29B771D54217D61A2EF8C7B0F040734D96ED7EF6DE6CA4814321
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$CurrentDirectory$EnvironmentVariable
                                                                                                                                                                                                                                                      • String ID: :
                                                                                                                                                                                                                                                      • API String ID: 2281059536-336475711
                                                                                                                                                                                                                                                      • Opcode ID: d600da2b7ed45aebc6d37c01417ccafd84ba126fbeceaa31be6a12e66bed1db2
                                                                                                                                                                                                                                                      • Instruction ID: 1bd8e98ad2dd6f826625229de36cc0a57b294287f25d03839864f010e08db2d9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d600da2b7ed45aebc6d37c01417ccafd84ba126fbeceaa31be6a12e66bed1db2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F2417136A0C78185E760BB65F44027E77A9FB5D790F440136EE8D83AA5DF3CE4858720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessagePost
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 410705778-3916222277
                                                                                                                                                                                                                                                      • Opcode ID: 7bee137265fb5014d2b543f6e157df9520fbe0187814ba912f6c14cf2ca86a50
                                                                                                                                                                                                                                                      • Instruction ID: 3ef2398b26578f898864b2f5ba3cdb3ffc771b74384b1b77e61fe83124713146
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7bee137265fb5014d2b543f6e157df9520fbe0187814ba912f6c14cf2ca86a50
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 24312F3261C7558AE720AF65E49537A73A0FB8E785F500536FA8D87BA9CF3CD1018B44
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message$FromMetricsMonitorPointSystem
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 3043705201-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: b1cef08877c957b104a08cd9897fa60d020e7807a6ff63bc0b0519007cdeadc3
                                                                                                                                                                                                                                                      • Instruction ID: 951ed37f66993adf3c2d585d989fda1f71a48c332f579565bca85d5cf55444fa
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b1cef08877c957b104a08cd9897fa60d020e7807a6ff63bc0b0519007cdeadc3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1A11FE7260C7448BE3259F28E15422BBBB1F78E794F504229E78A82A68DF7DD5848F00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF64BAA646D
                                                                                                                                                                                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF64BAA1A82,?,?,?,00007FF64B8AD659), ref: 00007FF64BAA648C
                                                                                                                                                                                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF64BAA1A82,?,?,?,00007FF64B8AD659), ref: 00007FF64BAA64AE
                                                                                                                                                                                                                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF64BAA1A82,?,?,?,00007FF64B8AD659), ref: 00007FF64BAA64EF
                                                                                                                                                                                                                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF64BAA1A82,?,?,?,00007FF64B8AD659), ref: 00007FF64BAA6507
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 66001078-0
                                                                                                                                                                                                                                                      • Opcode ID: c59fc74e2d5658a353b51ebe52c1d3597eed8c2644b95b3dcce62e6eea2e3444
                                                                                                                                                                                                                                                      • Instruction ID: 55c9127f0edc3dca341e5eba6f94f8b611d7b4c50c32d1f57c79e92c579a26ea
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c59fc74e2d5658a353b51ebe52c1d3597eed8c2644b95b3dcce62e6eea2e3444
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C6410932A1C60786EB64BF28E55427973A0FB5DB44F584035D64DC26A8DF3DE895CF20
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1717984340-0
                                                                                                                                                                                                                                                      • Opcode ID: 9a3bdcf3b161a89a23fbfc69f3bec4ddc1baeb67bc2e78718522a19521a8a6aa
                                                                                                                                                                                                                                                      • Instruction ID: 52443f2ad444c1a9db6e01f7f64efa3fcf32324c44986519dfb5b65b75bcfd20
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9a3bdcf3b161a89a23fbfc69f3bec4ddc1baeb67bc2e78718522a19521a8a6aa
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E317E3291CA468BE320AF11E44472FBAA4F78DB94F200139EB8987A64CF3DD8458F50
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FlsGetValue.KERNEL32(?,?,?,00007FF64BAC8C47,?,?,00000000,00007FF64BAC8EE2,?,?,?,?,?,00007FF64BAC8E6E), ref: 00007FF64BAE0C5B
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF64BAC8C47,?,?,00000000,00007FF64BAC8EE2,?,?,?,?,?,00007FF64BAC8E6E), ref: 00007FF64BAE0C7A
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF64BAC8C47,?,?,00000000,00007FF64BAC8EE2,?,?,?,?,?,00007FF64BAC8E6E), ref: 00007FF64BAE0CA2
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF64BAC8C47,?,?,00000000,00007FF64BAC8EE2,?,?,?,?,?,00007FF64BAC8E6E), ref: 00007FF64BAE0CB3
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF64BAC8C47,?,?,00000000,00007FF64BAC8EE2,?,?,?,?,?,00007FF64BAC8E6E), ref: 00007FF64BAE0CC4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Value
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3702945584-0
                                                                                                                                                                                                                                                      • Opcode ID: d0d4842443358ad62f2a13882dd4bdfab5b0675436308f08ac3345522d496841
                                                                                                                                                                                                                                                      • Instruction ID: 50dd18f9ba8bfc9962b3859f0d7e9294ea76708f188f4e523deda2d61fd0d467
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d0d4842443358ad62f2a13882dd4bdfab5b0675436308f08ac3345522d496841
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 52115960A8C24245FA69B371D54217D21A1DF8C7B0F085336E97ED6AF6DE2CE8C18321
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Value
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3702945584-0
                                                                                                                                                                                                                                                      • Opcode ID: af4241341766ce2e9e1be7036f6381574fa78b8e43e288db0333d41a38b6a67d
                                                                                                                                                                                                                                                      • Instruction ID: d0ac0d8b50c6bc60d194dc60a7c12a9de81eef9cb44efcef47b894badb692c61
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: af4241341766ce2e9e1be7036f6381574fa78b8e43e288db0333d41a38b6a67d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5F11E560A8D24746F979B271D4521BD3192DF8D774F181734D93EDAAF2ED2CB8C14221
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message
                                                                                                                                                                                                                                                      • String ID: 0$0
                                                                                                                                                                                                                                                      • API String ID: 2030045667-203156872
                                                                                                                                                                                                                                                      • Opcode ID: 6caa16854a35b4badb024bad1baed7d586a18f4617ca1ba13612c32c3a01b98f
                                                                                                                                                                                                                                                      • Instruction ID: 6e40fc7c62726c184f7f3af68d2238684429dea62cf6209ce90ca118b1507c0b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6caa16854a35b4badb024bad1baed7d586a18f4617ca1ba13612c32c3a01b98f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4B31E636608B889ADB61DB15E45439AB7A5F79D7D0F804435EA8D83B68EF7CC648CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message$MonitorRect$FromInfoWindow
                                                                                                                                                                                                                                                      • String ID: 0$0
                                                                                                                                                                                                                                                      • API String ID: 3203973389-203156872
                                                                                                                                                                                                                                                      • Opcode ID: bf1010573e3f3a245d3de0730b3cbbcce06f9b06f91d180bbfb8da37b1fbff6b
                                                                                                                                                                                                                                                      • Instruction ID: b0e946a2e1c0338f8aaa054afd7ab3d55b7d202ad28954034c45014974f769a5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bf1010573e3f3a245d3de0730b3cbbcce06f9b06f91d180bbfb8da37b1fbff6b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0E31EC36619B8886DB60DB59F49435AB7A5F7C9BC0F904026EB8D83B68DF7CC545CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MonitorRect$FromInfoWindow
                                                                                                                                                                                                                                                      • String ID: (
                                                                                                                                                                                                                                                      • API String ID: 2740140340-3887548279
                                                                                                                                                                                                                                                      • Opcode ID: c0da5ba939e15d805878956d32222060a52adf0d43ead3bad2df4335e0b549e8
                                                                                                                                                                                                                                                      • Instruction ID: c0f3ae2c5c567e7a0ddf93a7d816cc01f3b154dc7f4d79c3b063e12d53590549
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c0da5ba939e15d805878956d32222060a52adf0d43ead3bad2df4335e0b549e8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6AF0EC3660CB8496DA60EB14F84425AA760F7C8794F808531EACE83B38DF7CC549CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2718003287-0
                                                                                                                                                                                                                                                      • Opcode ID: 7b92207ffa09cd611185d3f0f1fec775b0867889f212acbfde8ee77df41c9b1b
                                                                                                                                                                                                                                                      • Instruction ID: 72b4e809c7008ec3a03185240a75dc44baf1722600159bb7623aa563073e420e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7b92207ffa09cd611185d3f0f1fec775b0867889f212acbfde8ee77df41c9b1b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 42D10232B0CA818AE751EF79D5502AC37B1FB48798B484236CE5DD7BA9DE38E446C310
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast
                                                                                                                                                                                                                                                      • String ID: eCode=%lu$product$taskbar_handler_error
                                                                                                                                                                                                                                                      • API String ID: 1452528299-2493891406
                                                                                                                                                                                                                                                      • Opcode ID: bf1dee13a2de0d83039dffb54421890ec699be2e45828ffa472cfa5b92ac9f2d
                                                                                                                                                                                                                                                      • Instruction ID: 30db0b0928afea8851201ce20fde24fcbf4c2bbfd5bcc7507fea3e0b4894527f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bf1dee13a2de0d83039dffb54421890ec699be2e45828ffa472cfa5b92ac9f2d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E361F83260DAC6A5DA60BB24E4413EAB361FBC9340F405436E6CD83B7AEE3CD559CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$CreateValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1009429713-0
                                                                                                                                                                                                                                                      • Opcode ID: 66c319f06b97a823e13bc55fe4e69eeb30db10a938984ddfb1fea882df6ec81d
                                                                                                                                                                                                                                                      • Instruction ID: c837a3e91808d387430bbf664a0e28e703b130db4fe6c43b39159fdda819290a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 66c319f06b97a823e13bc55fe4e69eeb30db10a938984ddfb1fea882df6ec81d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9B31FB3291DA8186E650FB25E45126EB7A0FBCA780F10543AF6CEC3A7ADE3CD4458F00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ConditionMask$InfoVerifyVersion
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2793162063-0
                                                                                                                                                                                                                                                      • Opcode ID: ca6a0869207d72d33c9b7a660a3a7bea133d9399d10461ba54ec6bb84780c07d
                                                                                                                                                                                                                                                      • Instruction ID: d9d199bc30036272d28533cdcb09f572abfe6d00e11753bbd2162aee1af23848
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ca6a0869207d72d33c9b7a660a3a7bea133d9399d10461ba54ec6bb84780c07d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C221387662C68086E770DF20E4583ABBBA0FB89744F001139E68987BA8EF7DC544CF40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharErrorLastMultiWide
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 203985260-0
                                                                                                                                                                                                                                                      • Opcode ID: bee03ca3288017b3369f8dcb09f862a3064febdc74deef89483fb6043f1d9de6
                                                                                                                                                                                                                                                      • Instruction ID: a83243c8c41843da3c41e34900e1e59741c342dd07eab67b6ec335ef87084aa8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bee03ca3288017b3369f8dcb09f862a3064febdc74deef89483fb6043f1d9de6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5B213B76A28B8687E320AF12E44432EBBB4F78DB84F144139DB8997B64DF3DD4518B10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$CreateQueryValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2495337196-0
                                                                                                                                                                                                                                                      • Opcode ID: b664341390eea32f7eaf1fb9b87576899c23662f92458e02ab7dcc225eb8d7df
                                                                                                                                                                                                                                                      • Instruction ID: 90a846a5ffa1b2431a3184d19d067435c225d235f58a46d2f187dd79c8508d58
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b664341390eea32f7eaf1fb9b87576899c23662f92458e02ab7dcc225eb8d7df
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4321C97251DA8186DA60AB15E49026EB7A4FBCDB80F506035FACE83B69DF3CD4548B00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$CreateDeleteValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1061628661-0
                                                                                                                                                                                                                                                      • Opcode ID: 2946e63c64ed9ec3f0f0fe999219063454bcb3b8117ae03f7ba7a61e6611d512
                                                                                                                                                                                                                                                      • Instruction ID: 83e6169736b164ac33a6c355e48082acde0fc7f28799377192ed8f252ece76b5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2946e63c64ed9ec3f0f0fe999219063454bcb3b8117ae03f7ba7a61e6611d512
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1421EE2291CA8185DA60BB61E89027FB760FBCE794F005135FACEC7A7ADF6CD5449B40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2933794660-0
                                                                                                                                                                                                                                                      • Opcode ID: c71fb8e88b71c372db582b079ead3d4d3277890d777de073fadcf7bcbc0d32b8
                                                                                                                                                                                                                                                      • Instruction ID: a3f5fe37693f83970dedfeefc0e3184ed1eeab272061f50fa555ae76f483798c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c71fb8e88b71c372db582b079ead3d4d3277890d777de073fadcf7bcbc0d32b8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B7113022B18F058AEB10EF60E8542B933A4F75EB58F441E35DA6D86BA4DF78D554C340
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorFileLastWrite
                                                                                                                                                                                                                                                      • String ID: U
                                                                                                                                                                                                                                                      • API String ID: 442123175-4171548499
                                                                                                                                                                                                                                                      • Opcode ID: 03d2d1504d171addd9b557c3c97fd95a93c136e99b01afc5296602e2ab2a4ada
                                                                                                                                                                                                                                                      • Instruction ID: 3b405c7d24eb144e8a07d188c78616bc68f8d04a19d10ad489e5ce5a3c3d1194
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 03d2d1504d171addd9b557c3c97fd95a93c136e99b01afc5296602e2ab2a4ada
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4541A222A2CA4186EB20BF29E4443AA77A1FB9C794F554435EE4DC7BA8EF3CD441C750
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: DefaultLanguageLocaleNameUser
                                                                                                                                                                                                                                                      • String ID: unknown
                                                                                                                                                                                                                                                      • API String ID: 288768712-2904991687
                                                                                                                                                                                                                                                      • Opcode ID: b0b4607f95da3a468da6b761cfe9e440c128df64839d1592e9dad790b794e265
                                                                                                                                                                                                                                                      • Instruction ID: 1ac44923f9faee05ca5004569e9a5a7ca6257e4f92d0ab79aaec72ef8c93d2d6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b0b4607f95da3a468da6b761cfe9e440c128df64839d1592e9dad790b794e265
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1631E832A1CA8596D620FB24E4416ABB760FBCA384F401136F6CD83A79DF3CD545CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF64B8C227F), ref: 00007FF64BAC3DF0
                                                                                                                                                                                                                                                      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF64B8C227F), ref: 00007FF64BAC3E31
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExceptionFileHeaderRaise
                                                                                                                                                                                                                                                      • String ID: csm
                                                                                                                                                                                                                                                      • API String ID: 2573137834-1018135373
                                                                                                                                                                                                                                                      • Opcode ID: 292631c76c28477b0b341e5100f2c649277cad9beabe8196f62ee79e546b0a13
                                                                                                                                                                                                                                                      • Instruction ID: 8001434e8f4c27de515ebfba2c0e43f2b0a95d83659820cb67715879fed3cac4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 292631c76c28477b0b341e5100f2c649277cad9beabe8196f62ee79e546b0a13
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2B112B3261CB8582EB61AF15F540269B7E5FB88B94F584231EE8C47B68DF3CD551CB00
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000008.00000002.6508089317.00007FF64B8A1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF64B8A0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508023030.00007FF64B8A0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508700239.00007FF64BB0B000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508835004.00007FF64BB52000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508919626.00007FF64BB53000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6508984255.00007FF64BB68000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509047536.00007FF64BB6A000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB6F000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509100571.00007FF64BB79000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000008.00000002.6509224144.00007FF64BB7C000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_8_2_7ff64b8a0000_PcAppStore.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorInfo
                                                                                                                                                                                                                                                      • String ID: RoOriginateLanguageException$combase.dll
                                                                                                                                                                                                                                                      • API String ID: 3619768924-3996158991
                                                                                                                                                                                                                                                      • Opcode ID: 23039f19f1820bb7f7476837f36a12bc1ccd444b90eeaabbed9ce580c32f9450
                                                                                                                                                                                                                                                      • Instruction ID: abbfb25e239707d4388516f0dbcce8c02377f4a313732f309ca859ac5efe484a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 23039f19f1820bb7f7476837f36a12bc1ccd444b90eeaabbed9ce580c32f9450
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7B016162A1CA4682EF10FB24E4510AA7771FF9E384F804536E58DC3A7ADE3CD205CB40

                                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                                      Execution Coverage:11.6%
                                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                      Signature Coverage:0.4%
                                                                                                                                                                                                                                                      Total number of Nodes:2000
                                                                                                                                                                                                                                                      Total number of Limit Nodes:15
                                                                                                                                                                                                                                                      execution_graph 16426 7ff733c6c4f8 16427 7ff733c6c50d 16426->16427 16428 7ff733c6c511 16426->16428 16439 7ff733c71504 GetEnvironmentStringsW 16428->16439 16431 7ff733c6c51e 16433 7ff733c6d7d4 11 API calls 16431->16433 16432 7ff733c6c52a 16447 7ff733c6c568 16432->16447 16433->16427 16436 7ff733c6d7d4 11 API calls 16437 7ff733c6c551 16436->16437 16438 7ff733c6d7d4 11 API calls 16437->16438 16438->16427 16440 7ff733c6c516 16439->16440 16442 7ff733c71528 16439->16442 16440->16431 16440->16432 16443 7ff733c6d810 12 API calls 16442->16443 16444 7ff733c7155f 16443->16444 16445 7ff733c6d7d4 11 API calls 16444->16445 16446 7ff733c7157f FreeEnvironmentStringsW 16445->16446 16446->16440 16448 7ff733c6c590 16447->16448 16449 7ff733c6f3e0 11 API calls 16448->16449 16461 7ff733c6c5cb 16449->16461 16450 7ff733c6c5d3 16451 7ff733c6d7d4 11 API calls 16450->16451 16452 7ff733c6c532 16451->16452 16452->16436 16453 7ff733c6c64d 16454 7ff733c6d7d4 11 API calls 16453->16454 16454->16452 16455 7ff733c6f3e0 11 API calls 16455->16461 16456 7ff733c6c63c 16475 7ff733c6c684 16456->16475 16460 7ff733c6d7d4 11 API calls 16460->16450 16461->16450 16461->16453 16461->16455 16461->16456 16462 7ff733c6c670 16461->16462 16463 7ff733c6d7d4 11 API calls 16461->16463 16466 7ff733c7140c 16461->16466 16464 7ff733c681c4 9 API calls 16462->16464 16463->16461 16465 7ff733c6c682 16464->16465 16467 7ff733c71419 16466->16467 16468 7ff733c71423 16466->16468 16467->16468 16473 7ff733c7143f 16467->16473 16469 7ff733c6ae64 11 API calls 16468->16469 16470 7ff733c7142b 16469->16470 16471 7ff733c68174 39 API calls 16470->16471 16472 7ff733c71437 16471->16472 16472->16461 16473->16472 16474 7ff733c6ae64 11 API calls 16473->16474 16474->16470 16476 7ff733c6c689 16475->16476 16477 7ff733c6c644 16475->16477 16478 7ff733c6c6b2 16476->16478 16480 7ff733c6d7d4 11 API calls 16476->16480 16477->16460 16479 7ff733c6d7d4 11 API calls 16478->16479 16479->16477 16480->16476 13792 7ff733c62b28 13815 7ff733c62358 13792->13815 13795 7ff733c62c74 13858 7ff733c62fdc IsProcessorFeaturePresent 13795->13858 13796 7ff733c62b44 13798 7ff733c62c7e 13796->13798 13799 7ff733c62b62 13796->13799 13800 7ff733c62fdc 7 API calls 13798->13800 13805 7ff733c62b83 13799->13805 13821 7ff733c6ce04 13799->13821 13803 7ff733c62c89 13800->13803 13802 7ff733c62b87 13804 7ff733c62c0d 13825 7ff733c63124 13804->13825 13805->13802 13805->13804 13847 7ff733c6c124 13805->13847 13807 7ff733c62c12 13828 7ff733c610b0 13807->13828 13810 7ff733c62c2e 13852 7ff733c6316c GetModuleHandleW 13810->13852 13812 7ff733c62c35 13812->13803 13854 7ff733c624dc 13812->13854 13816 7ff733c62360 13815->13816 13865 7ff733c641cc 13816->13865 13818 7ff733c62375 13818->13795 13818->13796 13819 7ff733c62371 13819->13818 13872 7ff733c641f4 13819->13872 13822 7ff733c6ce17 13821->13822 13823 7ff733c6ce3e 13822->13823 13922 7ff733c62a44 13822->13922 13823->13805 13826 7ff733c779a0 13825->13826 13827 7ff733c6313b GetStartupInfoW 13826->13827 13827->13807 13829 7ff733c610e6 13828->13829 14195 7ff733c551e0 13829->14195 13831 7ff733c610f0 13832 7ff733c551e0 51 API calls 13831->13832 13833 7ff733c61109 13832->13833 13834 7ff733c551e0 51 API calls 13833->13834 13835 7ff733c61122 13834->13835 14200 7ff733c5e2d0 GetCommandLineW CommandLineToArgvW 13835->14200 13837 7ff733c61136 14270 7ff733c60400 13837->14270 13841 7ff733c6115b 13842 7ff733c61185 13841->13842 14285 7ff733c5f6f0 13841->14285 14338 7ff733c60b40 13842->14338 13846 7ff733c6118f 13846->13810 13848 7ff733c6c13b 13847->13848 13849 7ff733c6c15c 13847->13849 13848->13804 13850 7ff733c6b748 172 API calls 13849->13850 13851 7ff733c6c161 13850->13851 13853 7ff733c6317d 13852->13853 13853->13812 13856 7ff733c624ed 13854->13856 13855 7ff733c624fd 13855->13802 13856->13855 13857 7ff733c641f4 7 API calls 13856->13857 13857->13855 13859 7ff733c63002 13858->13859 13860 7ff733c63021 RtlCaptureContext RtlLookupFunctionEntry 13859->13860 13861 7ff733c6304a RtlVirtualUnwind 13860->13861 13862 7ff733c63086 13860->13862 13861->13862 13863 7ff733c630b8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13862->13863 13864 7ff733c63106 13863->13864 13864->13798 13878 7ff733c67858 13865->13878 13868 7ff733c641d9 13868->13819 13873 7ff733c641fc 13872->13873 13874 7ff733c64206 13872->13874 13914 7ff733c646f8 13873->13914 13874->13818 13877 7ff733c678a0 DeleteCriticalSection 13877->13874 13880 7ff733c67860 13878->13880 13881 7ff733c67891 13880->13881 13882 7ff733c641d5 13880->13882 13895 7ff733c67bf8 13880->13895 13883 7ff733c678a0 DeleteCriticalSection 13881->13883 13882->13868 13884 7ff733c646b0 13882->13884 13883->13882 13910 7ff733c67acc 13884->13910 13900 7ff733c6797c 13895->13900 13898 7ff733c67c38 13898->13880 13899 7ff733c67c43 InitializeCriticalSectionAndSpinCount 13899->13898 13901 7ff733c67a66 13900->13901 13902 7ff733c679c0 13900->13902 13901->13898 13901->13899 13902->13901 13903 7ff733c679ee LoadLibraryExW 13902->13903 13904 7ff733c67aad GetProcAddress 13902->13904 13909 7ff733c67a31 LoadLibraryExW 13902->13909 13905 7ff733c67a8d 13903->13905 13906 7ff733c67a0f GetLastError 13903->13906 13904->13901 13908 7ff733c67abe 13904->13908 13905->13904 13907 7ff733c67aa4 FreeLibrary 13905->13907 13906->13902 13907->13904 13908->13901 13909->13902 13909->13905 13911 7ff733c6797c 5 API calls 13910->13911 13912 7ff733c67af1 TlsAlloc 13911->13912 13915 7ff733c64707 13914->13915 13917 7ff733c64201 13914->13917 13918 7ff733c67b14 13915->13918 13917->13877 13919 7ff733c6797c 5 API calls 13918->13919 13920 7ff733c67b3b TlsFree 13919->13920 13923 7ff733c62a54 13922->13923 13939 7ff733c6ce4c 13923->13939 13925 7ff733c62a60 13945 7ff733c62394 13925->13945 13927 7ff733c62fdc 7 API calls 13929 7ff733c62af9 13927->13929 13928 7ff733c62a78 13937 7ff733c62acd 13928->13937 13950 7ff733c62544 13928->13950 13929->13822 13931 7ff733c62a8d 13953 7ff733c6c374 13931->13953 13937->13927 13938 7ff733c62ae9 13937->13938 13938->13822 13940 7ff733c6ce5d 13939->13940 13941 7ff733c6ce65 13940->13941 13979 7ff733c6ae64 13940->13979 13941->13925 13946 7ff733c623a5 13945->13946 13949 7ff733c623aa 13945->13949 13947 7ff733c62fdc 7 API calls 13946->13947 13946->13949 13948 7ff733c6241e 13947->13948 13949->13928 14174 7ff733c62508 13950->14174 13952 7ff733c6254d 13952->13931 13954 7ff733c62a99 13953->13954 13955 7ff733c6c394 13953->13955 13954->13937 13978 7ff733c632e0 InitializeSListHead 13954->13978 13956 7ff733c6c39c 13955->13956 13957 7ff733c6c3b2 GetModuleFileNameW 13955->13957 13958 7ff733c6ae64 11 API calls 13956->13958 13961 7ff733c6c3dd 13957->13961 13959 7ff733c6c3a1 13958->13959 13960 7ff733c68174 39 API calls 13959->13960 13960->13954 14189 7ff733c6c314 13961->14189 13964 7ff733c6c425 13965 7ff733c6ae64 11 API calls 13964->13965 13966 7ff733c6c42a 13965->13966 13968 7ff733c6d7d4 11 API calls 13966->13968 13967 7ff733c6c43d 13971 7ff733c6c48b 13967->13971 13972 7ff733c6c4a4 13967->13972 13977 7ff733c6c45f 13967->13977 13969 7ff733c6c438 13968->13969 13969->13954 13970 7ff733c6d7d4 11 API calls 13970->13954 13973 7ff733c6d7d4 11 API calls 13971->13973 13975 7ff733c6d7d4 11 API calls 13972->13975 13974 7ff733c6c494 13973->13974 13976 7ff733c6d7d4 11 API calls 13974->13976 13975->13977 13976->13969 13977->13970 13985 7ff733c6d5ec GetLastError 13979->13985 13981 7ff733c6ae6d 13982 7ff733c68174 13981->13982 14045 7ff733c6800c 13982->14045 13986 7ff733c6d62d FlsSetValue 13985->13986 13987 7ff733c6d610 13985->13987 13988 7ff733c6d63f 13986->13988 13999 7ff733c6d61d SetLastError 13986->13999 13987->13986 13987->13999 14002 7ff733c6f3e0 13988->14002 13992 7ff733c6d66c FlsSetValue 13994 7ff733c6d68a 13992->13994 13995 7ff733c6d678 FlsSetValue 13992->13995 13993 7ff733c6d65c FlsSetValue 13996 7ff733c6d665 13993->13996 14017 7ff733c6d224 13994->14017 13995->13996 14011 7ff733c6d7d4 13996->14011 13999->13981 14003 7ff733c6f3f1 14002->14003 14004 7ff733c6f3ff 14002->14004 14003->14004 14005 7ff733c6f442 14003->14005 14004->14005 14006 7ff733c6f426 HeapAlloc 14004->14006 14022 7ff733c6bc60 14004->14022 14008 7ff733c6ae64 10 API calls 14005->14008 14006->14004 14007 7ff733c6f440 14006->14007 14009 7ff733c6d64e 14007->14009 14008->14009 14009->13992 14009->13993 14012 7ff733c6d7d9 HeapFree 14011->14012 14016 7ff733c6d808 14011->14016 14013 7ff733c6d7f4 GetLastError 14012->14013 14012->14016 14014 7ff733c6d801 14013->14014 14015 7ff733c6ae64 9 API calls 14014->14015 14015->14016 14016->13999 14031 7ff733c6d0fc 14017->14031 14025 7ff733c6bca0 14022->14025 14030 7ff733c70278 EnterCriticalSection 14025->14030 14043 7ff733c70278 EnterCriticalSection 14031->14043 14046 7ff733c68037 14045->14046 14053 7ff733c680a8 14046->14053 14049 7ff733c68081 14050 7ff733c68096 14049->14050 14052 7ff733c67d88 39 API calls 14049->14052 14050->13941 14052->14050 14072 7ff733c67df0 14053->14072 14057 7ff733c6805e 14057->14049 14063 7ff733c67d88 14057->14063 14064 7ff733c67ddb 14063->14064 14065 7ff733c67d9b GetLastError 14063->14065 14064->14049 14066 7ff733c67dab 14065->14066 14067 7ff733c6d6b4 16 API calls 14066->14067 14068 7ff733c67dc6 SetLastError 14067->14068 14068->14064 14069 7ff733c67de9 14068->14069 14108 7ff733c6b9c4 14069->14108 14073 7ff733c67e0c GetLastError 14072->14073 14074 7ff733c67e47 14072->14074 14075 7ff733c67e1c 14073->14075 14074->14057 14078 7ff733c67e5c 14074->14078 14085 7ff733c6d6b4 14075->14085 14079 7ff733c67e78 GetLastError SetLastError 14078->14079 14080 7ff733c67e90 14078->14080 14079->14080 14080->14057 14081 7ff733c681c4 IsProcessorFeaturePresent 14080->14081 14082 7ff733c681d7 14081->14082 14102 7ff733c67ea8 14082->14102 14084 7ff733c681f2 GetCurrentProcess TerminateProcess 14086 7ff733c6d6ee FlsSetValue 14085->14086 14087 7ff733c6d6d3 FlsGetValue 14085->14087 14089 7ff733c6d6fb 14086->14089 14090 7ff733c67e37 SetLastError 14086->14090 14088 7ff733c6d6e8 14087->14088 14087->14090 14088->14086 14091 7ff733c6f3e0 11 API calls 14089->14091 14090->14074 14092 7ff733c6d70a 14091->14092 14093 7ff733c6d728 FlsSetValue 14092->14093 14094 7ff733c6d718 FlsSetValue 14092->14094 14096 7ff733c6d746 14093->14096 14097 7ff733c6d734 FlsSetValue 14093->14097 14095 7ff733c6d721 14094->14095 14098 7ff733c6d7d4 11 API calls 14095->14098 14099 7ff733c6d224 11 API calls 14096->14099 14097->14095 14098->14090 14100 7ff733c6d74e 14099->14100 14101 7ff733c6d7d4 11 API calls 14100->14101 14101->14090 14103 7ff733c67ee2 14102->14103 14104 7ff733c67f0a RtlCaptureContext RtlLookupFunctionEntry 14103->14104 14105 7ff733c67f7a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14104->14105 14106 7ff733c67f44 RtlVirtualUnwind 14104->14106 14107 7ff733c67fcc 14105->14107 14106->14105 14107->14084 14117 7ff733c6fa6c 14108->14117 14143 7ff733c6fa24 14117->14143 14148 7ff733c70278 EnterCriticalSection 14143->14148 14175 7ff733c62522 14174->14175 14177 7ff733c6251b 14174->14177 14178 7ff733c6cb10 14175->14178 14177->13952 14181 7ff733c6c74c 14178->14181 14188 7ff733c70278 EnterCriticalSection 14181->14188 14190 7ff733c6c32c 14189->14190 14191 7ff733c6c364 14189->14191 14190->14191 14192 7ff733c6f3e0 11 API calls 14190->14192 14191->13964 14191->13967 14193 7ff733c6c35a 14192->14193 14194 7ff733c6d7d4 11 API calls 14193->14194 14194->14191 14342 7ff733c58ce0 14195->14342 14199 7ff733c551fb 14199->13831 14201 7ff733c5e331 14200->14201 14380 7ff733c55b50 14201->14380 14204 7ff733c5e49b 14206 7ff733c55810 41 API calls 14204->14206 14205 7ff733c5e364 14383 7ff733c55810 14205->14383 14209 7ff733c5e4af 14206->14209 14401 7ff733c57600 14209->14401 14212 7ff733c5e39e 14391 7ff733c56e80 14212->14391 14217 7ff733c56e80 39 API calls 14218 7ff733c5e4e3 14217->14218 14220 7ff733c55810 41 API calls 14218->14220 14219 7ff733c5e487 14221 7ff733c56e80 39 API calls 14219->14221 14222 7ff733c5e4f8 14220->14222 14223 7ff733c5e495 14221->14223 14224 7ff733c57600 41 API calls 14222->14224 14223->13837 14226 7ff733c5e50e 14224->14226 14225 7ff733c5e3c5 14225->14219 14227 7ff733c5ff20 41 API calls 14225->14227 14228 7ff733c556c0 41 API calls 14226->14228 14230 7ff733c5e41d 14227->14230 14229 7ff733c5e51e 14228->14229 14231 7ff733c56e80 39 API calls 14229->14231 14232 7ff733c5ff20 41 API calls 14230->14232 14233 7ff733c5e52c 14231->14233 14234 7ff733c5e445 14232->14234 14235 7ff733c55810 41 API calls 14233->14235 14394 7ff733c57630 14234->14394 14238 7ff733c5e541 14235->14238 14240 7ff733c57600 41 API calls 14238->14240 14242 7ff733c5e557 14240->14242 14244 7ff733c556c0 41 API calls 14242->14244 14243 7ff733c56e80 39 API calls 14245 7ff733c5e479 14243->14245 14246 7ff733c5e567 14244->14246 14247 7ff733c56e80 39 API calls 14245->14247 14248 7ff733c56e80 39 API calls 14246->14248 14247->14219 14249 7ff733c5e575 14248->14249 14408 7ff733c55120 14249->14408 14253 7ff733c5e5b1 14254 7ff733c55120 58 API calls 14253->14254 14255 7ff733c5e5d7 14254->14255 14256 7ff733c572c0 41 API calls 14255->14256 14257 7ff733c5e5f8 14256->14257 14258 7ff733c55120 58 API calls 14257->14258 14259 7ff733c5e621 14258->14259 14260 7ff733c572c0 41 API calls 14259->14260 14261 7ff733c5e642 14260->14261 14262 7ff733c56e80 39 API calls 14261->14262 14263 7ff733c5e65e 14262->14263 14264 7ff733c56e80 39 API calls 14263->14264 14265 7ff733c5e66c 14264->14265 14266 7ff733c56e80 39 API calls 14265->14266 14267 7ff733c5e67a 14266->14267 14420 7ff733c56eb0 14267->14420 14269 7ff733c5e688 14269->13837 14872 7ff733c60710 14270->14872 14272 7ff733c60431 14273 7ff733c60c40 14272->14273 14274 7ff733c60c55 14273->14274 14275 7ff733c60c5c 14274->14275 14276 7ff733c60c67 14274->14276 14277 7ff733c61f38 49 API calls 14275->14277 15046 7ff733c61d00 CloseHandle 14276->15046 14279 7ff733c60c66 14277->14279 14279->14276 14280 7ff733c60c85 14281 7ff733c60c89 14280->14281 14282 7ff733c60c94 14280->14282 14283 7ff733c61f38 49 API calls 14281->14283 14282->13841 14284 7ff733c60c93 14283->14284 14284->14282 15047 7ff733c5d860 14285->15047 14287 7ff733c5f71f 15071 7ff733c5d550 14287->15071 14289 7ff733c5f733 14290 7ff733c55810 41 API calls 14289->14290 14291 7ff733c5f75c 14290->14291 14292 7ff733c55810 41 API calls 14291->14292 14293 7ff733c5f771 14292->14293 15133 7ff733c5dba0 14293->15133 14295 7ff733c5f77f 14296 7ff733c5dba0 48 API calls 14295->14296 14297 7ff733c5f790 14296->14297 15141 7ff733c60390 14297->15141 14303 7ff733c5f7a7 14304 7ff733c551e0 51 API calls 14303->14304 14305 7ff733c5f7d6 14304->14305 15150 7ff733c589f0 14305->15150 14339 7ff733c60b53 14338->14339 14340 7ff733c60b5f 14339->14340 16201 7ff733c6b748 14339->16201 14340->13846 14349 7ff733c58d60 14342->14349 14345 7ff733c55070 14346 7ff733c5507e 14345->14346 14348 7ff733c550be 14346->14348 14371 7ff733c585a0 14346->14371 14348->14199 14350 7ff733c58d89 14349->14350 14362 7ff733c58ddc 14349->14362 14365 7ff733c62868 AcquireSRWLockExclusive 14350->14365 14352 7ff733c62868 3 API calls 14355 7ff733c58e0e 14352->14355 14358 7ff733c62544 42 API calls 14355->14358 14364 7ff733c551ee 14355->14364 14360 7ff733c58e47 14358->14360 14370 7ff733c627fc AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 14360->14370 14362->14352 14362->14364 14364->14345 14366 7ff733c6287e 14365->14366 14367 7ff733c62883 ReleaseSRWLockExclusive 14366->14367 14369 7ff733c62888 SleepConditionVariableSRW 14366->14369 14369->14366 14372 7ff733c585b6 14371->14372 14375 7ff733c63468 14372->14375 14374 7ff733c585c7 14374->14346 14376 7ff733c63487 14375->14376 14377 7ff733c634b0 RtlPcToFileHeader 14376->14377 14378 7ff733c634d2 RaiseException 14376->14378 14379 7ff733c634c8 14377->14379 14378->14374 14379->14378 14423 7ff733c552d0 14380->14423 14384 7ff733c55837 14383->14384 14479 7ff733c520b0 14384->14479 14386 7ff733c5585c 14387 7ff733c5ff20 14386->14387 14388 7ff733c5ff4a 14387->14388 14524 7ff733c55760 14388->14524 14545 7ff733c5c230 14391->14545 14393 7ff733c56e93 14393->14225 14563 7ff733c54390 14394->14563 14396 7ff733c57652 14397 7ff733c573a0 14396->14397 14399 7ff733c573b8 14397->14399 14398 7ff733c573bf 14398->14243 14399->14398 14628 7ff733c5c810 14399->14628 14640 7ff733c54560 14401->14640 14403 7ff733c57622 14404 7ff733c556c0 14403->14404 14405 7ff733c556e2 14404->14405 14651 7ff733c52400 14405->14651 14407 7ff733c55746 14407->14217 14409 7ff733c58ce0 49 API calls 14408->14409 14410 7ff733c55133 14409->14410 14411 7ff733c55070 2 API calls 14410->14411 14412 7ff733c55140 14411->14412 14657 7ff733c58600 14412->14657 14416 7ff733c55166 14417 7ff733c572c0 14416->14417 14831 7ff733c571c0 14417->14831 14419 7ff733c572dd 14419->14253 14847 7ff733c56d20 14420->14847 14424 7ff733c55301 14423->14424 14427 7ff733c59a00 14424->14427 14426 7ff733c5530c 14426->14204 14426->14205 14428 7ff733c59a22 14427->14428 14431 7ff733c51e50 14428->14431 14430 7ff733c59a59 14430->14426 14434 7ff733c5c3b0 14431->14434 14433 7ff733c51e77 14433->14430 14439 7ff733c52dd0 14434->14439 14440 7ff733c52dfe 14439->14440 14441 7ff733c52e03 14439->14441 14450 7ff733c5bd90 14440->14450 14443 7ff733c51c00 14441->14443 14444 7ff733c51c15 14443->14444 14445 7ff733c51c11 14443->14445 14446 7ff733c51c2c 14444->14446 14447 7ff733c51c20 14444->14447 14445->14433 14462 7ff733c59ac0 14446->14462 14454 7ff733c51d60 14447->14454 14451 7ff733c5bd9e 14450->14451 14452 7ff733c63468 2 API calls 14451->14452 14453 7ff733c5bdaf 14452->14453 14453->14441 14455 7ff733c51d88 14454->14455 14456 7ff733c51d83 14454->14456 14458 7ff733c59ac0 4 API calls 14455->14458 14457 7ff733c5bd90 2 API calls 14456->14457 14457->14455 14459 7ff733c51d93 14458->14459 14461 7ff733c51db4 14459->14461 14465 7ff733c68194 14459->14465 14461->14445 14470 7ff733c622d0 14462->14470 14466 7ff733c6800c 39 API calls 14465->14466 14467 7ff733c681ad 14466->14467 14468 7ff733c681c4 9 API calls 14467->14468 14469 7ff733c681c2 14468->14469 14471 7ff733c622db 14470->14471 14472 7ff733c59ad3 14471->14472 14473 7ff733c6bc60 EnterCriticalSection LeaveCriticalSection 14471->14473 14474 7ff733c622fa 14471->14474 14472->14445 14473->14471 14475 7ff733c62305 14474->14475 14476 7ff733c62cb4 RtlPcToFileHeader RaiseException 14474->14476 14477 7ff733c62cd4 RtlPcToFileHeader RaiseException 14475->14477 14476->14475 14478 7ff733c6230b 14477->14478 14480 7ff733c520e6 14479->14480 14483 7ff733c520f5 14480->14483 14485 7ff733c5c2e0 14480->14485 14482 7ff733c52131 14482->14386 14483->14482 14488 7ff733c51d00 14483->14488 14491 7ff733c61394 14485->14491 14512 7ff733c51c70 14488->14512 14496 7ff733c61234 14491->14496 14494 7ff733c63468 2 API calls 14495 7ff733c613b6 14494->14495 14499 7ff733c633b0 14496->14499 14498 7ff733c61268 14498->14494 14500 7ff733c633d1 14499->14500 14501 7ff733c63406 14499->14501 14500->14501 14503 7ff733c6cfe0 14500->14503 14501->14498 14504 7ff733c6cfed 14503->14504 14505 7ff733c6cff7 14503->14505 14504->14505 14510 7ff733c6d012 14504->14510 14506 7ff733c6ae64 11 API calls 14505->14506 14507 7ff733c6cffe 14506->14507 14508 7ff733c68174 39 API calls 14507->14508 14509 7ff733c6d00a 14508->14509 14509->14501 14510->14509 14511 7ff733c6ae64 11 API calls 14510->14511 14511->14507 14515 7ff733c5c3e0 14512->14515 14520 7ff733c52d80 14515->14520 14518 7ff733c51c00 41 API calls 14519 7ff733c51c90 14518->14519 14519->14482 14521 7ff733c52dae 14520->14521 14522 7ff733c52db3 14520->14522 14523 7ff733c5bd90 2 API calls 14521->14523 14522->14518 14523->14522 14525 7ff733c55799 14524->14525 14530 7ff733c5a0b0 14525->14530 14527 7ff733c557b3 14528 7ff733c520b0 41 API calls 14527->14528 14529 7ff733c55805 14528->14529 14529->14212 14531 7ff733c5a0ce 14530->14531 14533 7ff733c5a0d3 14530->14533 14534 7ff733c5c320 14531->14534 14533->14527 14537 7ff733c613b8 14534->14537 14542 7ff733c612f4 14537->14542 14540 7ff733c63468 2 API calls 14541 7ff733c613da 14540->14541 14543 7ff733c633b0 39 API calls 14542->14543 14544 7ff733c61328 14543->14544 14544->14540 14546 7ff733c5c24d 14545->14546 14548 7ff733c5c289 14546->14548 14549 7ff733c5a260 14546->14549 14548->14393 14552 7ff733c5ce80 14549->14552 14555 7ff733c529b0 14552->14555 14554 7ff733c5a28d 14554->14548 14556 7ff733c529c9 14555->14556 14557 7ff733c529d8 14555->14557 14559 7ff733c598b0 14556->14559 14557->14554 14560 7ff733c59914 14559->14560 14561 7ff733c68194 39 API calls 14560->14561 14562 7ff733c59938 14560->14562 14561->14560 14562->14557 14564 7ff733c543d7 14563->14564 14566 7ff733c543fc 14564->14566 14571 7ff733c5a070 14564->14571 14566->14396 14567 7ff733c54436 14575 7ff733c512e0 14567->14575 14569 7ff733c544bf 14580 7ff733c56d60 14569->14580 14572 7ff733c5a083 14571->14572 14573 7ff733c5a0a2 14572->14573 14586 7ff733c5c090 14572->14586 14573->14567 14589 7ff733c55320 14575->14589 14577 7ff733c51307 14593 7ff733c54b90 14577->14593 14579 7ff733c51352 14579->14569 14581 7ff733c56d75 14580->14581 14585 7ff733c56de6 14580->14585 14607 7ff733c54c40 14581->14607 14610 7ff733c56e00 14585->14610 14587 7ff733c61394 41 API calls 14586->14587 14588 7ff733c5c0a0 14587->14588 14588->14573 14590 7ff733c5533d 14589->14590 14597 7ff733c59a80 14590->14597 14594 7ff733c54bb7 14593->14594 14600 7ff733c513f0 14594->14600 14598 7ff733c5c3b0 41 API calls 14597->14598 14599 7ff733c55348 14598->14599 14599->14577 14603 7ff733c51750 14600->14603 14602 7ff733c5144d 14602->14579 14604 7ff733c5177c 14603->14604 14605 7ff733c556c0 41 API calls 14604->14605 14606 7ff733c51789 14605->14606 14606->14602 14613 7ff733c57e90 14607->14613 14609 7ff733c54c5a 14609->14585 14621 7ff733c56c60 14610->14621 14616 7ff733c56ed0 14613->14616 14615 7ff733c57ea7 14615->14609 14617 7ff733c56e80 39 API calls 14616->14617 14618 7ff733c56eea 14617->14618 14619 7ff733c56e80 39 API calls 14618->14619 14620 7ff733c56ef7 14619->14620 14620->14615 14622 7ff733c56c9b 14621->14622 14623 7ff733c56c75 14621->14623 14622->14566 14625 7ff733c5ce20 14623->14625 14626 7ff733c529b0 39 API calls 14625->14626 14627 7ff733c5ce46 14626->14627 14627->14622 14629 7ff733c5c893 14628->14629 14631 7ff733c5c834 14628->14631 14632 7ff733c53030 14629->14632 14631->14398 14633 7ff733c53061 14632->14633 14634 7ff733c5c2e0 41 API calls 14633->14634 14635 7ff733c5306d 14633->14635 14634->14635 14636 7ff733c51d00 41 API calls 14635->14636 14637 7ff733c530ae 14636->14637 14638 7ff733c5a260 39 API calls 14637->14638 14639 7ff733c5311d 14637->14639 14638->14639 14639->14631 14641 7ff733c545a7 14640->14641 14642 7ff733c5a070 41 API calls 14641->14642 14643 7ff733c545cc 14641->14643 14644 7ff733c54606 14642->14644 14643->14403 14648 7ff733c51200 14644->14648 14646 7ff733c5468f 14647 7ff733c56d60 39 API calls 14646->14647 14647->14643 14649 7ff733c55320 41 API calls 14648->14649 14650 7ff733c51227 14649->14650 14650->14646 14652 7ff733c52436 14651->14652 14653 7ff733c5c2e0 41 API calls 14652->14653 14654 7ff733c52445 14652->14654 14653->14654 14655 7ff733c51d00 41 API calls 14654->14655 14656 7ff733c52481 14654->14656 14655->14656 14656->14407 14658 7ff733c5861b 14657->14658 14659 7ff733c55150 14657->14659 14658->14659 14664 7ff733c590d0 14658->14664 14659->14416 14661 7ff733c572f0 14659->14661 14770 7ff733c57290 14661->14770 14669 7ff733c588c0 14664->14669 14667 7ff733c590f3 14667->14659 14681 7ff733c58400 14669->14681 14672 7ff733c59110 14702 7ff733c584a0 FindResourceW 14672->14702 14674 7ff733c59131 14680 7ff733c5913e 14674->14680 14706 7ff733c58ca0 14674->14706 14680->14667 14687 7ff733c6225c EnterCriticalSection 14681->14687 14683 7ff733c5848b 14683->14667 14683->14672 14685 7ff733c58424 14685->14683 14686 7ff733c6225c 4 API calls 14685->14686 14694 7ff733c58500 FindResourceExW 14685->14694 14686->14685 14688 7ff733c62294 LeaveCriticalSection 14687->14688 14689 7ff733c62287 14687->14689 14688->14685 14689->14688 14690 7ff733c62290 14689->14690 14691 7ff733c622c2 14689->14691 14690->14688 14692 7ff733c585a0 2 API calls 14691->14692 14693 7ff733c622cc 14692->14693 14695 7ff733c5854e 14694->14695 14696 7ff733c5854a 14694->14696 14698 7ff733c59ae0 LoadResource 14695->14698 14696->14685 14699 7ff733c59b17 LockResource 14698->14699 14701 7ff733c59b10 14698->14701 14700 7ff733c59b36 SizeofResource 14699->14700 14699->14701 14700->14701 14701->14696 14703 7ff733c584de 14702->14703 14704 7ff733c584e2 14702->14704 14703->14674 14705 7ff733c59ae0 3 API calls 14704->14705 14705->14703 14716 7ff733c59280 14706->14716 14709 7ff733c58780 14710 7ff733c5879e 14709->14710 14742 7ff733c60070 14710->14742 14713 7ff733c59670 14766 7ff733c596a0 14713->14766 14715 7ff733c5968b 14715->14680 14717 7ff733c59294 14716->14717 14719 7ff733c5929e 14716->14719 14718 7ff733c585a0 2 API calls 14717->14718 14718->14719 14720 7ff733c58cbb 14719->14720 14722 7ff733c591b0 14719->14722 14720->14709 14723 7ff733c591c7 14722->14723 14724 7ff733c591f7 14723->14724 14727 7ff733c59208 14723->14727 14729 7ff733c588e0 14724->14729 14726 7ff733c59205 14726->14720 14727->14726 14735 7ff733c59300 14727->14735 14730 7ff733c588f7 14729->14730 14731 7ff733c59890 RtlPcToFileHeader RaiseException 14730->14731 14732 7ff733c58958 14730->14732 14731->14732 14733 7ff733c60140 39 API calls 14732->14733 14734 7ff733c589c2 14733->14734 14734->14726 14736 7ff733c59317 14735->14736 14737 7ff733c5933e 14736->14737 14738 7ff733c59346 14736->14738 14739 7ff733c59890 RtlPcToFileHeader RaiseException 14737->14739 14740 7ff733c59890 RtlPcToFileHeader RaiseException 14738->14740 14741 7ff733c59343 14738->14741 14739->14741 14740->14741 14741->14726 14747 7ff733c6b600 14742->14747 14744 7ff733c600a1 14756 7ff733c58390 14744->14756 14748 7ff733c6b615 14747->14748 14752 7ff733c6b611 14747->14752 14749 7ff733c6b61a 14748->14749 14748->14752 14753 7ff733c6b65e 14748->14753 14750 7ff733c6ae64 11 API calls 14749->14750 14751 7ff733c6b61f 14750->14751 14754 7ff733c68174 39 API calls 14751->14754 14752->14744 14753->14752 14755 7ff733c6ae64 11 API calls 14753->14755 14754->14752 14755->14751 14757 7ff733c583a7 14756->14757 14758 7ff733c583cf 14756->14758 14759 7ff733c583ae 14757->14759 14760 7ff733c583c5 14757->14760 14758->14713 14761 7ff733c583d2 14759->14761 14763 7ff733c583bc 14759->14763 14762 7ff733c585a0 2 API calls 14760->14762 14764 7ff733c585a0 2 API calls 14761->14764 14762->14758 14763->14758 14765 7ff733c585a0 2 API calls 14763->14765 14764->14758 14765->14758 14768 7ff733c596b4 14766->14768 14767 7ff733c585a0 2 API calls 14769 7ff733c596d1 14767->14769 14768->14767 14768->14769 14769->14715 14773 7ff733c59720 14770->14773 14774 7ff733c59738 14773->14774 14777 7ff733c59750 14774->14777 14778 7ff733c5977a 14777->14778 14779 7ff733c5976a 14777->14779 14781 7ff733c585a0 2 API calls 14778->14781 14782 7ff733c5978c 14778->14782 14792 7ff733c58830 14779->14792 14781->14782 14783 7ff733c58ca0 41 API calls 14782->14783 14784 7ff733c597c6 14783->14784 14785 7ff733c597d6 14784->14785 14786 7ff733c59812 14784->14786 14796 7ff733c587e0 14785->14796 14799 7ff733c60140 14786->14799 14789 7ff733c5980f 14790 7ff733c59670 2 API calls 14789->14790 14791 7ff733c572ad 14790->14791 14791->14416 14793 7ff733c58843 14792->14793 14794 7ff733c596a0 2 API calls 14793->14794 14795 7ff733c58860 14793->14795 14794->14795 14795->14791 14815 7ff733c60280 14796->14815 14798 7ff733c5881d 14798->14789 14800 7ff733c60167 14799->14800 14803 7ff733c60160 14799->14803 14801 7ff733c60190 14800->14801 14805 7ff733c601aa 14800->14805 14802 7ff733c6ae64 11 API calls 14801->14802 14804 7ff733c60195 14802->14804 14803->14789 14806 7ff733c68174 39 API calls 14804->14806 14805->14803 14807 7ff733c601fd 14805->14807 14810 7ff733c60214 14805->14810 14806->14803 14808 7ff733c6ae64 11 API calls 14807->14808 14809 7ff733c60202 14808->14809 14811 7ff733c68174 39 API calls 14809->14811 14810->14803 14812 7ff733c6ae64 11 API calls 14810->14812 14811->14803 14813 7ff733c60246 14812->14813 14814 7ff733c68174 39 API calls 14813->14814 14814->14803 14816 7ff733c602a7 14815->14816 14827 7ff733c602a0 14815->14827 14817 7ff733c602ea 14816->14817 14818 7ff733c602d0 14816->14818 14821 7ff733c60313 14817->14821 14824 7ff733c6032a 14817->14824 14819 7ff733c6ae64 11 API calls 14818->14819 14820 7ff733c602d5 14819->14820 14822 7ff733c68174 39 API calls 14820->14822 14823 7ff733c6ae64 11 API calls 14821->14823 14822->14827 14825 7ff733c60318 14823->14825 14824->14827 14828 7ff733c6ae64 11 API calls 14824->14828 14826 7ff733c68174 39 API calls 14825->14826 14826->14827 14827->14798 14829 7ff733c6035c 14828->14829 14830 7ff733c68174 39 API calls 14829->14830 14830->14827 14832 7ff733c571d8 14831->14832 14833 7ff733c57253 14832->14833 14835 7ff733c5721f 14832->14835 14837 7ff733c57250 14832->14837 14838 7ff733c58660 14833->14838 14836 7ff733c59750 41 API calls 14835->14836 14836->14837 14837->14419 14839 7ff733c58688 14838->14839 14840 7ff733c586ad 14839->14840 14842 7ff733c58700 14839->14842 14844 7ff733c59890 14839->14844 14840->14837 14843 7ff733c60140 39 API calls 14842->14843 14843->14840 14845 7ff733c585a0 2 API calls 14844->14845 14846 7ff733c5989e 14845->14846 14846->14842 14848 7ff733c56d33 14847->14848 14851 7ff733c52af0 14848->14851 14852 7ff733c52b08 14851->14852 14857 7ff733c52b40 14852->14857 14860 7ff733c52b53 14857->14860 14858 7ff733c52b23 14862 7ff733c52cb0 14858->14862 14859 7ff733c52b40 39 API calls 14859->14860 14860->14858 14860->14859 14866 7ff733c52d10 14860->14866 14863 7ff733c52ccb 14862->14863 14864 7ff733c5ce20 39 API calls 14863->14864 14865 7ff733c52b35 14864->14865 14865->14269 14867 7ff733c52d2f 14866->14867 14868 7ff733c54c40 39 API calls 14867->14868 14869 7ff733c52d3c 14868->14869 14870 7ff733c52cb0 39 API calls 14869->14870 14871 7ff733c52d4b 14870->14871 14871->14860 14873 7ff733c60746 14872->14873 14882 7ff733c609d0 14873->14882 14875 7ff733c6075f 14887 7ff733c6b8ac 14875->14887 14878 7ff733c607c7 14905 7ff733c61f38 14878->14905 14879 7ff733c607ba 14879->14272 14881 7ff733c607dd 14881->14879 14883 7ff733c622d0 4 API calls 14882->14883 14884 7ff733c609fa 14883->14884 14886 7ff733c60a20 14884->14886 14911 7ff733c603b0 14884->14911 14886->14875 14888 7ff733c6b8cc 14887->14888 14889 7ff733c6b8e3 14887->14889 14890 7ff733c6ae64 11 API calls 14888->14890 14936 7ff733c6b848 14889->14936 14892 7ff733c6b8d1 14890->14892 14894 7ff733c68174 39 API calls 14892->14894 14895 7ff733c607a7 14894->14895 14895->14878 14895->14879 14896 7ff733c6b8f6 CreateThread 14896->14895 14897 7ff733c6b926 GetLastError 14896->14897 14943 7ff733c6add8 14897->14943 14900 7ff733c6b93c CloseHandle 14901 7ff733c6b942 14900->14901 14902 7ff733c6b94b FreeLibrary 14901->14902 14903 7ff733c6b951 14901->14903 14902->14903 14904 7ff733c6d7d4 11 API calls 14903->14904 14904->14895 14906 7ff733c61f51 14905->14906 14948 7ff733c61e18 14906->14948 14908 7ff733c61f6d 14909 7ff733c63468 2 API calls 14908->14909 14910 7ff733c61f7e GetModuleHandleW GetProcAddress GetProcAddress GetProcAddress 14909->14910 14910->14881 14914 7ff733c604f0 14911->14914 14913 7ff733c603eb 14913->14886 14917 7ff733c605a0 14914->14917 14916 7ff733c60520 14916->14913 14922 7ff733c60550 14917->14922 14923 7ff733c60571 14922->14923 14924 7ff733c60470 41 API calls 14923->14924 14925 7ff733c6058b 14924->14925 14926 7ff733c60470 14925->14926 14929 7ff733c550f0 14926->14929 14932 7ff733c55020 14929->14932 14931 7ff733c5510d 14931->14916 14933 7ff733c55038 14932->14933 14934 7ff733c58660 41 API calls 14933->14934 14935 7ff733c55047 14934->14935 14935->14931 14937 7ff733c6f3e0 11 API calls 14936->14937 14938 7ff733c6b86a 14937->14938 14939 7ff733c6d7d4 11 API calls 14938->14939 14940 7ff733c6b874 14939->14940 14941 7ff733c6b87d GetModuleHandleExW 14940->14941 14942 7ff733c6b879 14940->14942 14941->14942 14942->14895 14942->14896 14944 7ff733c6d5ec 11 API calls 14943->14944 14945 7ff733c6ade5 14944->14945 14946 7ff733c6d5ec 11 API calls 14945->14946 14947 7ff733c6ae07 14946->14947 14947->14900 14947->14901 14949 7ff733c61e54 14948->14949 14949->14949 14961 7ff733c51ef0 14949->14961 14951 7ff733c61e6a 14967 7ff733c561c0 14951->14967 14953 7ff733c61f04 14953->14908 14954 7ff733c61e8b 14954->14953 14955 7ff733c68194 39 API calls 14954->14955 14956 7ff733c61f37 14955->14956 14957 7ff733c61e18 41 API calls 14956->14957 14958 7ff733c61f6d 14957->14958 14959 7ff733c63468 2 API calls 14958->14959 14960 7ff733c61f7e GetModuleHandleW GetProcAddress GetProcAddress GetProcAddress 14959->14960 14960->14908 14962 7ff733c51f26 14961->14962 14963 7ff733c5c2e0 41 API calls 14962->14963 14964 7ff733c51f35 14962->14964 14963->14964 14966 7ff733c51f71 14964->14966 14976 7ff733c51ca0 14964->14976 14966->14951 14986 7ff733c55460 14967->14986 14975 7ff733c56274 14975->14954 14979 7ff733c51c40 14976->14979 14982 7ff733c5c380 14979->14982 14983 7ff733c5c398 14982->14983 14984 7ff733c51c00 41 API calls 14983->14984 14985 7ff733c51c60 14984->14985 14985->14966 14987 7ff733c55482 14986->14987 15007 7ff733c52280 14987->15007 14989 7ff733c554e6 14990 7ff733c5ae80 14989->14990 14991 7ff733c5aea8 14990->14991 14992 7ff733c5aec3 14991->14992 15013 7ff733c5c460 14991->15013 15017 7ff733c5c410 14992->15017 14996 7ff733c56e50 39 API calls 14997 7ff733c5af09 14996->14997 14998 7ff733c56e50 39 API calls 14997->14998 14999 7ff733c56248 14998->14999 15000 7ff733c56ae0 14999->15000 15001 7ff733c56af8 15000->15001 15033 7ff733c56680 15001->15033 15003 7ff733c56269 15004 7ff733c56e50 15003->15004 15036 7ff733c5c180 15004->15036 15006 7ff733c56e63 15006->14975 15008 7ff733c522b6 15007->15008 15009 7ff733c5c2e0 41 API calls 15008->15009 15010 7ff733c522c5 15008->15010 15009->15010 15011 7ff733c51ca0 41 API calls 15010->15011 15012 7ff733c52301 15010->15012 15011->15012 15012->14989 15014 7ff733c5c478 15013->15014 15021 7ff733c5c4a0 15014->15021 15016 7ff733c5c492 15016->14992 15018 7ff733c5c439 15017->15018 15019 7ff733c5c4a0 41 API calls 15018->15019 15020 7ff733c5aefe 15019->15020 15020->14996 15022 7ff733c5c561 15021->15022 15024 7ff733c5c4de 15021->15024 15025 7ff733c53160 15022->15025 15024->15016 15026 7ff733c531b2 15025->15026 15027 7ff733c5c2e0 41 API calls 15026->15027 15028 7ff733c531c6 15026->15028 15027->15028 15029 7ff733c51ca0 41 API calls 15028->15029 15030 7ff733c53225 15029->15030 15031 7ff733c5a220 39 API calls 15030->15031 15032 7ff733c532c6 15030->15032 15031->15032 15032->15024 15034 7ff733c633b0 39 API calls 15033->15034 15035 7ff733c566e7 15034->15035 15035->15003 15037 7ff733c5c19d 15036->15037 15039 7ff733c5c1d9 15037->15039 15040 7ff733c5a220 15037->15040 15039->15006 15043 7ff733c5ce50 15040->15043 15044 7ff733c529b0 39 API calls 15043->15044 15045 7ff733c5a24d 15044->15045 15045->15039 15046->14280 15048 7ff733c5d894 15047->15048 15049 7ff733c55120 58 API calls 15048->15049 15050 7ff733c5d8bf 15049->15050 15051 7ff733c55120 58 API calls 15050->15051 15052 7ff733c5d8d1 15051->15052 15160 7ff733c5e960 15052->15160 15054 7ff733c5d8eb 15055 7ff733c55120 58 API calls 15054->15055 15059 7ff733c5d999 15054->15059 15056 7ff733c5d957 15055->15056 15057 7ff733c55120 58 API calls 15056->15057 15058 7ff733c5d974 15057->15058 15175 7ff733c5e850 15058->15175 15070 7ff733c5da3b 15059->15070 15187 7ff733c5c8d0 15059->15187 15063 7ff733c5da71 15063->14287 15065 7ff733c5c8d0 41 API calls 15066 7ff733c5da13 15065->15066 15067 7ff733c5c8d0 41 API calls 15066->15067 15066->15070 15068 7ff733c5da27 15067->15068 15069 7ff733c5c8d0 41 API calls 15068->15069 15068->15070 15069->15070 15184 7ff733c56f20 15070->15184 15072 7ff733c5d57d 15071->15072 15224 7ff733c5d370 GetModuleFileNameW 15072->15224 15074 7ff733c5d58a 15235 7ff733c5d480 15074->15235 15076 7ff733c5d59d 15245 7ff733c51870 15076->15245 15079 7ff733c51870 41 API calls 15080 7ff733c5d5d7 15079->15080 15251 7ff733c5dad0 15080->15251 15083 7ff733c5dad0 65 API calls 15084 7ff733c5d5f9 15083->15084 15264 7ff733c5cbc0 15084->15264 15086 7ff733c5d60d 15087 7ff733c5cbc0 71 API calls 15086->15087 15088 7ff733c5d621 15087->15088 15089 7ff733c51870 41 API calls 15088->15089 15090 7ff733c5d644 15089->15090 15290 7ff733c5da90 15090->15290 15093 7ff733c56e80 39 API calls 15094 7ff733c5d671 15093->15094 15095 7ff733c51870 41 API calls 15094->15095 15096 7ff733c5d68e 15095->15096 15097 7ff733c5da90 65 API calls 15096->15097 15098 7ff733c5d6a7 15097->15098 15099 7ff733c56e80 39 API calls 15098->15099 15100 7ff733c5d6bb 15099->15100 15101 7ff733c51870 41 API calls 15100->15101 15102 7ff733c5d6d8 15101->15102 15103 7ff733c5da90 65 API calls 15102->15103 15104 7ff733c5d6f1 15103->15104 15105 7ff733c56e80 39 API calls 15104->15105 15106 7ff733c5d705 15105->15106 15107 7ff733c51870 41 API calls 15106->15107 15108 7ff733c5d722 15107->15108 15109 7ff733c5da90 65 API calls 15108->15109 15110 7ff733c5d73b 15109->15110 15111 7ff733c56e80 39 API calls 15110->15111 15112 7ff733c5d74f 15111->15112 15113 7ff733c51870 41 API calls 15112->15113 15114 7ff733c5d76c 15113->15114 15115 7ff733c5da90 65 API calls 15114->15115 15116 7ff733c5d785 15115->15116 15117 7ff733c56e80 39 API calls 15116->15117 15118 7ff733c5d799 15117->15118 15119 7ff733c51870 41 API calls 15118->15119 15120 7ff733c5d7b6 15119->15120 15121 7ff733c5da90 65 API calls 15120->15121 15122 7ff733c5d7cf 15121->15122 15123 7ff733c56e80 39 API calls 15122->15123 15124 7ff733c5d7e3 15123->15124 15125 7ff733c56e80 39 API calls 15124->15125 15126 7ff733c5d80b 15125->15126 15127 7ff733c56e80 39 API calls 15126->15127 15128 7ff733c5d819 15127->15128 15129 7ff733c56e80 39 API calls 15128->15129 15130 7ff733c5d827 15129->15130 15131 7ff733c56e80 39 API calls 15130->15131 15132 7ff733c5d835 15131->15132 15132->14289 15134 7ff733c5dbd2 15133->15134 15135 7ff733c5dbea CloseHandle 15134->15135 15138 7ff733c5dbf9 15134->15138 15136 7ff733c5dc46 15135->15136 15136->14295 15139 7ff733c5dc17 CloseHandle 15138->15139 15140 7ff733c5dc39 CloseHandle 15138->15140 15878 7ff733c6b264 15138->15878 15139->15136 15140->15136 15895 7ff733c6b6d4 GetSystemTimeAsFileTime 15141->15895 15144 7ff733c6b6bc 15145 7ff733c6d474 39 API calls 15144->15145 15146 7ff733c5f7a2 15145->15146 15147 7ff733c6b690 15146->15147 15148 7ff733c6d474 39 API calls 15147->15148 15149 7ff733c6b699 15148->15149 15149->14303 15897 7ff733c58ad0 15150->15897 15161 7ff733c5e9a1 15160->15161 15162 7ff733c551e0 51 API calls 15161->15162 15163 7ff733c5e9ab 15162->15163 15164 7ff733c5e9c1 RegCreateKeyW 15163->15164 15165 7ff733c5ea85 15164->15165 15166 7ff733c5e9df 15164->15166 15167 7ff733c55120 58 API calls 15165->15167 15168 7ff733c58ca0 41 API calls 15166->15168 15174 7ff733c5ea66 15167->15174 15169 7ff733c5e9ed 15168->15169 15170 7ff733c5e9ff RegQueryValueExW 15169->15170 15191 7ff733c59610 15170->15191 15173 7ff733c550f0 41 API calls 15173->15174 15174->15054 15195 7ff733c5ed20 15175->15195 15177 7ff733c5e892 15178 7ff733c5e8a0 RegCreateKeyW 15177->15178 15179 7ff733c5e8be 15178->15179 15180 7ff733c5e93f 15178->15180 15181 7ff733c5e8dd RegQueryValueExW 15179->15181 15180->15059 15182 7ff733c5e930 RegCloseKey 15181->15182 15183 7ff733c5e921 RegCloseKey 15181->15183 15182->15180 15183->15180 15217 7ff733c5c0b0 15184->15217 15188 7ff733c5c908 15187->15188 15189 7ff733c5c903 15187->15189 15188->15065 15188->15070 15221 7ff733c5c340 15189->15221 15192 7ff733c59624 15191->15192 15193 7ff733c596a0 2 API calls 15192->15193 15194 7ff733c5965c RegCloseKey 15193->15194 15194->15173 15198 7ff733c53c40 15195->15198 15197 7ff733c5ed42 15197->15177 15199 7ff733c53c5d 15198->15199 15201 7ff733c53ca8 15199->15201 15202 7ff733c53da0 15199->15202 15201->15197 15203 7ff733c53dd2 15202->15203 15205 7ff733c53de1 15203->15205 15210 7ff733c5c300 15203->15210 15206 7ff733c51c40 41 API calls 15205->15206 15207 7ff733c53e5a 15206->15207 15213 7ff733c59f40 15207->15213 15209 7ff733c53ef3 15209->15201 15211 7ff733c61394 41 API calls 15210->15211 15212 7ff733c5c310 15211->15212 15212->15205 15214 7ff733c59f62 15213->15214 15215 7ff733c5ce50 39 API calls 15214->15215 15216 7ff733c59fef 15214->15216 15215->15216 15216->15209 15219 7ff733c5c0c3 15217->15219 15218 7ff733c56f33 15218->15063 15219->15218 15220 7ff733c5ce50 39 API calls 15219->15220 15220->15218 15222 7ff733c613b8 41 API calls 15221->15222 15223 7ff733c5c350 15222->15223 15223->15188 15227 7ff733c5d3ad 15224->15227 15225 7ff733c5d3db 15297 7ff733c6b4a4 15225->15297 15227->15225 15320 7ff733c62664 15227->15320 15228 7ff733c5d407 15230 7ff733c5d40b 15228->15230 15231 7ff733c5d434 15228->15231 15232 7ff733c55810 41 API calls 15230->15232 15233 7ff733c55810 41 API calls 15231->15233 15234 7ff733c5d41f 15232->15234 15233->15234 15234->15074 15236 7ff733c55810 41 API calls 15235->15236 15237 7ff733c5d4be SHGetFolderPathW 15236->15237 15238 7ff733c5d4f1 15237->15238 15241 7ff733c5d521 15237->15241 15239 7ff733c55810 41 API calls 15238->15239 15240 7ff733c5d500 15239->15240 15435 7ff733c57320 15240->15435 15241->15076 15243 7ff733c5d517 15244 7ff733c56e80 39 API calls 15243->15244 15244->15241 15246 7ff733c51895 15245->15246 15247 7ff733c518cf 15246->15247 15248 7ff733c5c2e0 41 API calls 15246->15248 15439 7ff733c55870 15247->15439 15248->15247 15250 7ff733c51922 15250->15079 15443 7ff733c51580 15251->15443 15255 7ff733c5db0c 15256 7ff733c51580 41 API calls 15255->15256 15263 7ff733c5db3e 15255->15263 15257 7ff733c5db28 15256->15257 15452 7ff733c5dd40 15257->15452 15259 7ff733c5d5e5 15259->15083 15260 7ff733c5db74 15260->15259 15262 7ff733c57170 39 API calls 15260->15262 15262->15259 15263->15260 15455 7ff733c57170 15263->15455 15265 7ff733c5dad0 65 API calls 15264->15265 15266 7ff733c5cbf3 15265->15266 15267 7ff733c51580 41 API calls 15266->15267 15269 7ff733c5cbfa 15266->15269 15268 7ff733c5cc18 15267->15268 15673 7ff733c56530 15268->15673 15269->15086 15272 7ff733c57170 39 API calls 15273 7ff733c5cc43 15272->15273 15679 7ff733c5c920 15273->15679 15275 7ff733c5cc89 15683 7ff733c5cfd0 15275->15683 15277 7ff733c5cd9e 15698 7ff733c570d0 15277->15698 15280 7ff733c570d0 40 API calls 15281 7ff733c5cdb9 15280->15281 15283 7ff733c570d0 40 API calls 15281->15283 15283->15269 15285 7ff733c5dd40 65 API calls 15287 7ff733c5cccf 15285->15287 15287->15277 15287->15285 15288 7ff733c5cbc0 71 API calls 15287->15288 15289 7ff733c56e80 39 API calls 15287->15289 15687 7ff733c57760 15287->15687 15692 7ff733c5ddb0 15287->15692 15695 7ff733c57700 15287->15695 15288->15287 15289->15287 15291 7ff733c51580 41 API calls 15290->15291 15292 7ff733c5daab 15291->15292 15293 7ff733c5d100 65 API calls 15292->15293 15294 7ff733c5dab6 15293->15294 15295 7ff733c57170 39 API calls 15294->15295 15296 7ff733c5d65d 15295->15296 15296->15093 15298 7ff733c6b4f9 SetCurrentDirectoryW 15297->15298 15299 7ff733c6b4da 15297->15299 15301 7ff733c6b503 GetLastError 15298->15301 15302 7ff733c6b512 15298->15302 15323 7ff733c6ae44 15299->15323 15305 7ff733c6add8 11 API calls 15301->15305 15326 7ff733c6b3e0 GetCurrentDirectoryW 15302->15326 15312 7ff733c6b4f1 15305->15312 15307 7ff733c6ae64 11 API calls 15309 7ff733c6b4e6 15307->15309 15308 7ff733c6b552 15308->15312 15313 7ff733c6d7d4 11 API calls 15308->15313 15311 7ff733c68174 39 API calls 15309->15311 15310 7ff733c6b565 15314 7ff733c6b57f 15310->15314 15338 7ff733c6ed98 15310->15338 15311->15312 15312->15228 15313->15312 15314->15312 15317 7ff733c6d7d4 11 API calls 15314->15317 15317->15312 15318 7ff733c6b5b4 GetLastError 15319 7ff733c6add8 11 API calls 15318->15319 15319->15314 15425 7ff733c62678 IsProcessorFeaturePresent 15320->15425 15324 7ff733c6d5ec 11 API calls 15323->15324 15325 7ff733c6ae4d 15324->15325 15325->15307 15327 7ff733c6b41b 15326->15327 15328 7ff733c6b405 GetLastError 15326->15328 15331 7ff733c6d7d4 11 API calls 15327->15331 15333 7ff733c6b417 15327->15333 15335 7ff733c6b43a 15327->15335 15329 7ff733c6add8 11 API calls 15328->15329 15330 7ff733c6b412 15329->15330 15334 7ff733c6ae64 11 API calls 15330->15334 15331->15335 15333->15308 15333->15310 15334->15333 15342 7ff733c6d810 15335->15342 15337 7ff733c6b475 GetCurrentDirectoryW 15337->15328 15337->15333 15339 7ff733c6eda5 15338->15339 15340 7ff733c6b58b SetEnvironmentVariableW 15338->15340 15349 7ff733c6ec64 15339->15349 15340->15314 15340->15318 15343 7ff733c6d85b 15342->15343 15347 7ff733c6d81f 15342->15347 15345 7ff733c6ae64 11 API calls 15343->15345 15344 7ff733c6d842 HeapAlloc 15346 7ff733c6b44b 15344->15346 15344->15347 15345->15346 15346->15333 15346->15337 15347->15343 15347->15344 15348 7ff733c6bc60 2 API calls 15347->15348 15348->15347 15350 7ff733c6ec85 15349->15350 15356 7ff733c6ec98 15349->15356 15357 7ff733c6b188 15350->15357 15353 7ff733c6ece4 15365 7ff733c6f98c 15353->15365 15354 7ff733c6ae64 11 API calls 15354->15353 15356->15340 15358 7ff733c6b1ac 15357->15358 15364 7ff733c6b1a7 15357->15364 15359 7ff733c6d474 39 API calls 15358->15359 15358->15364 15360 7ff733c6b1c7 15359->15360 15370 7ff733c6d870 15360->15370 15364->15353 15364->15354 15364->15356 15366 7ff733c6b188 39 API calls 15365->15366 15367 7ff733c6f9b1 15366->15367 15393 7ff733c6f658 15367->15393 15371 7ff733c6d885 15370->15371 15373 7ff733c6b1ea 15370->15373 15371->15373 15378 7ff733c720fc 15371->15378 15374 7ff733c6d8dc 15373->15374 15375 7ff733c6d904 15374->15375 15376 7ff733c6d8f1 15374->15376 15375->15364 15376->15375 15390 7ff733c71108 15376->15390 15379 7ff733c6d474 39 API calls 15378->15379 15380 7ff733c7210b 15379->15380 15381 7ff733c72156 15380->15381 15382 7ff733c70278 EnterCriticalSection 15380->15382 15381->15373 15383 7ff733c72134 15382->15383 15384 7ff733c7216c 11 API calls 15383->15384 15385 7ff733c72144 15384->15385 15386 7ff733c702cc LeaveCriticalSection 15385->15386 15387 7ff733c72151 15386->15387 15387->15381 15388 7ff733c6b9c4 39 API calls 15387->15388 15389 7ff733c72169 15388->15389 15391 7ff733c6d474 39 API calls 15390->15391 15392 7ff733c71111 15391->15392 15394 7ff733c6f699 15393->15394 15422 7ff733c71474 15394->15422 15424 7ff733c7147d MultiByteToWideChar 15422->15424 15426 7ff733c6268f 15425->15426 15431 7ff733c62718 RtlCaptureContext RtlLookupFunctionEntry 15426->15431 15432 7ff733c62748 RtlVirtualUnwind 15431->15432 15433 7ff733c626a3 15431->15433 15432->15433 15434 7ff733c6255c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15433->15434 15436 7ff733c57338 15435->15436 15437 7ff733c5c230 39 API calls 15436->15437 15438 7ff733c5733f 15436->15438 15437->15438 15438->15243 15440 7ff733c558b3 15439->15440 15441 7ff733c51d00 41 API calls 15440->15441 15442 7ff733c55989 15440->15442 15441->15442 15442->15250 15458 7ff733c52610 15443->15458 15446 7ff733c5d100 15447 7ff733c5d127 15446->15447 15470 7ff733c5d190 15447->15470 15449 7ff733c5d140 15450 7ff733c5d16b 15449->15450 15473 7ff733c5bdc0 15449->15473 15450->15255 15658 7ff733c5fde0 15452->15658 15454 7ff733c5dd58 15454->15263 15456 7ff733c56e80 39 API calls 15455->15456 15457 7ff733c57186 15456->15457 15457->15260 15459 7ff733c5263c 15458->15459 15462 7ff733c52700 15459->15462 15463 7ff733c52725 15462->15463 15466 7ff733c515d0 15463->15466 15465 7ff733c515bd 15465->15446 15467 7ff733c51618 15466->15467 15468 7ff733c520b0 41 API calls 15467->15468 15469 7ff733c5167c 15468->15469 15469->15465 15482 7ff733c5fe80 15470->15482 15472 7ff733c5d1b2 15472->15449 15533 7ff733c55550 15473->15533 15478 7ff733c63468 2 API calls 15479 7ff733c5be46 15478->15479 15480 7ff733c56e50 39 API calls 15479->15480 15481 7ff733c5be51 15480->15481 15481->15450 15485 7ff733c5a7c0 15482->15485 15484 7ff733c5febc 15484->15472 15486 7ff733c5a7ec 15485->15486 15489 7ff733c61754 15486->15489 15488 7ff733c5a80e 15488->15484 15490 7ff733c61796 15489->15490 15491 7ff733c618b1 15490->15491 15492 7ff733c6179f 15490->15492 15494 7ff733c617f7 GetFileAttributesExW 15490->15494 15530 7ff733c61a84 CreateFileW 15491->15530 15492->15488 15496 7ff733c6185c 15494->15496 15497 7ff733c6180b GetLastError 15494->15497 15496->15491 15496->15492 15497->15492 15500 7ff733c6181a FindFirstFileW 15497->15500 15498 7ff733c618fa 15502 7ff733c61909 GetFileInformationByHandleEx 15498->15502 15518 7ff733c619a7 15498->15518 15499 7ff733c618da 15501 7ff733c618e5 CloseHandle 15499->15501 15514 7ff733c618f3 15499->15514 15503 7ff733c6182e GetLastError 15500->15503 15504 7ff733c61839 FindClose 15500->15504 15505 7ff733c61a69 15501->15505 15501->15514 15507 7ff733c61923 GetLastError 15502->15507 15510 7ff733c61949 15502->15510 15503->15492 15504->15496 15511 7ff733c6b9c4 39 API calls 15505->15511 15506 7ff733c619c2 GetFileInformationByHandleEx 15512 7ff733c619fc 15506->15512 15513 7ff733c619d8 GetLastError 15506->15513 15507->15514 15515 7ff733c61931 CloseHandle 15507->15515 15508 7ff733c61a13 15508->15492 15516 7ff733c61a19 CloseHandle 15508->15516 15509 7ff733c61a4f 15509->15514 15519 7ff733c61a55 CloseHandle 15509->15519 15517 7ff733c6196a GetFileInformationByHandleEx 15510->15517 15510->15518 15520 7ff733c61a6e 15511->15520 15512->15508 15512->15509 15513->15514 15521 7ff733c619ea CloseHandle 15513->15521 15514->15492 15515->15514 15522 7ff733c61a7a 15515->15522 15516->15492 15516->15505 15517->15518 15523 7ff733c61986 GetLastError 15517->15523 15518->15506 15518->15512 15519->15505 15519->15514 15529 7ff733c6b9c4 39 API calls 15520->15529 15521->15514 15525 7ff733c61a74 15521->15525 15524 7ff733c6b9c4 39 API calls 15522->15524 15523->15514 15527 7ff733c61994 CloseHandle 15523->15527 15528 7ff733c61a80 15524->15528 15526 7ff733c6b9c4 39 API calls 15525->15526 15526->15522 15527->15514 15527->15520 15529->15525 15531 7ff733c618d4 15530->15531 15532 7ff733c61ac6 GetLastError 15530->15532 15531->15498 15531->15499 15532->15531 15534 7ff733c55577 15533->15534 15535 7ff733c51ef0 41 API calls 15534->15535 15536 7ff733c5559c 15535->15536 15537 7ff733c56830 15536->15537 15546 7ff733c56bb0 15537->15546 15541 7ff733c568b4 15552 7ff733c5b2a0 15541->15552 15543 7ff733c5695a 15544 7ff733c57170 39 API calls 15543->15544 15545 7ff733c56965 15544->15545 15545->15478 15547 7ff733c561c0 41 API calls 15546->15547 15548 7ff733c5687e 15547->15548 15549 7ff733c56a30 15548->15549 15550 7ff733c556c0 41 API calls 15549->15550 15551 7ff733c56a5a 15550->15551 15551->15541 15553 7ff733c5b2e4 15552->15553 15578 7ff733c615ac 15553->15578 15555 7ff733c5b2f9 15583 7ff733c52760 15555->15583 15557 7ff733c5b37a 15558 7ff733c52760 45 API calls 15557->15558 15559 7ff733c5b3fe 15558->15559 15597 7ff733c5eb90 15559->15597 15563 7ff733c5b499 15564 7ff733c51980 41 API calls 15563->15564 15565 7ff733c5b4c4 15564->15565 15607 7ff733c57b90 15565->15607 15567 7ff733c5b52f 15610 7ff733c57bc0 15567->15610 15568 7ff733c5b4da 15568->15567 15572 7ff733c51980 41 API calls 15568->15572 15571 7ff733c56e50 39 API calls 15574 7ff733c5b54d 15571->15574 15573 7ff733c5b519 15572->15573 15575 7ff733c57b90 41 API calls 15573->15575 15576 7ff733c56e50 39 API calls 15574->15576 15575->15567 15577 7ff733c5b55b 15576->15577 15577->15543 15613 7ff733c6b994 15578->15613 15581 7ff733c615cb 15581->15555 15582 7ff733c615be AreFileApisANSI 15582->15581 15584 7ff733c52794 15583->15584 15585 7ff733c528b9 15584->15585 15587 7ff733c527e2 15584->15587 15618 7ff733c5bfd0 15584->15618 15585->15557 15624 7ff733c615d4 WideCharToMultiByte 15587->15624 15593 7ff733c52852 15594 7ff733c615d4 4 API calls 15593->15594 15595 7ff733c528aa 15594->15595 15596 7ff733c5a040 41 API calls 15595->15596 15596->15585 15598 7ff733c5ebb4 15597->15598 15599 7ff733c5b484 15597->15599 15598->15599 15600 7ff733c5ebd9 15598->15600 15602 7ff733c5ec2c 15598->15602 15604 7ff733c51980 15599->15604 15638 7ff733c53aa0 15600->15638 15602->15599 15646 7ff733c59c00 15602->15646 15650 7ff733c549d0 15604->15650 15606 7ff733c5199d 15606->15563 15608 7ff733c5c410 41 API calls 15607->15608 15609 7ff733c57bad 15608->15609 15609->15568 15654 7ff733c5e6b0 15610->15654 15612 7ff733c57bdc 15612->15571 15614 7ff733c6d474 39 API calls 15613->15614 15615 7ff733c6b99d 15614->15615 15616 7ff733c6d870 39 API calls 15615->15616 15617 7ff733c615b5 15616->15617 15617->15581 15617->15582 15619 7ff733c5bfeb 15618->15619 15620 7ff733c56b60 39 API calls 15619->15620 15621 7ff733c5c00c 15620->15621 15622 7ff733c63468 RtlPcToFileHeader RaiseException 15621->15622 15623 7ff733c5c01d 15622->15623 15623->15587 15625 7ff733c6162b GetLastError 15624->15625 15626 7ff733c61633 15624->15626 15625->15626 15627 7ff733c61640 WideCharToMultiByte 15626->15627 15628 7ff733c52827 15626->15628 15627->15628 15629 7ff733c6166e GetLastError 15627->15629 15630 7ff733c5a040 15628->15630 15629->15628 15631 7ff733c52836 15630->15631 15632 7ff733c5a050 15630->15632 15634 7ff733c5ecb0 15631->15634 15633 7ff733c5c030 41 API calls 15632->15633 15633->15631 15635 7ff733c5eccd 15634->15635 15636 7ff733c5c5a0 41 API calls 15635->15636 15637 7ff733c5ecde 15635->15637 15636->15637 15637->15593 15639 7ff733c53aea 15638->15639 15640 7ff733c5c2e0 41 API calls 15639->15640 15641 7ff733c53afe 15639->15641 15640->15641 15642 7ff733c51ca0 41 API calls 15641->15642 15643 7ff733c53b5d 15642->15643 15644 7ff733c5a220 39 API calls 15643->15644 15645 7ff733c53be4 15643->15645 15644->15645 15645->15599 15647 7ff733c59c1d 15646->15647 15648 7ff733c5a220 39 API calls 15647->15648 15649 7ff733c59c95 15648->15649 15649->15599 15651 7ff733c549fe 15650->15651 15652 7ff733c5c4a0 41 API calls 15651->15652 15653 7ff733c54a4c 15652->15653 15653->15606 15655 7ff733c5e741 15654->15655 15657 7ff733c5e6dc 15654->15657 15656 7ff733c53700 41 API calls 15655->15656 15656->15657 15657->15612 15659 7ff733c5a7c0 58 API calls 15658->15659 15660 7ff733c5fe14 15659->15660 15661 7ff733c5fe4c 15660->15661 15663 7ff733c5bf20 15660->15663 15661->15454 15664 7ff733c5bf48 15663->15664 15665 7ff733c55550 41 API calls 15664->15665 15666 7ff733c5bf6c 15665->15666 15667 7ff733c56830 46 API calls 15666->15667 15668 7ff733c5bfa0 15667->15668 15669 7ff733c63468 2 API calls 15668->15669 15670 7ff733c5bfb1 15669->15670 15671 7ff733c56e50 39 API calls 15670->15671 15672 7ff733c5bfbc 15671->15672 15672->15661 15674 7ff733c5654b 15673->15674 15701 7ff733c52e80 15674->15701 15676 7ff733c56561 15677 7ff733c56581 15676->15677 15678 7ff733c5bf20 46 API calls 15676->15678 15677->15272 15678->15677 15680 7ff733c5c93d 15679->15680 15681 7ff733c570d0 40 API calls 15680->15681 15682 7ff733c5c947 15681->15682 15682->15275 15684 7ff733c5cff7 15683->15684 15685 7ff733c570d0 40 API calls 15684->15685 15686 7ff733c5d001 15685->15686 15686->15287 15831 7ff733c59950 15687->15831 15689 7ff733c57776 15690 7ff733c57791 15689->15690 15839 7ff733c5be60 15689->15839 15690->15287 15693 7ff733c5fde0 65 API calls 15692->15693 15694 7ff733c5ddc8 15693->15694 15694->15287 15696 7ff733c556c0 41 API calls 15695->15696 15697 7ff733c57728 15696->15697 15697->15287 15699 7ff733c56f00 40 API calls 15698->15699 15700 7ff733c570e6 15699->15700 15700->15280 15712 7ff733c55ef0 15701->15712 15704 7ff733c52f07 15717 7ff733c56fb0 15704->15717 15707 7ff733c52f1d 15707->15676 15708 7ff733c52ee6 15727 7ff733c57440 15708->15727 15713 7ff733c56a30 41 API calls 15712->15713 15714 7ff733c55f1c 15713->15714 15734 7ff733c5b100 15714->15734 15716 7ff733c52ec2 15716->15704 15722 7ff733c54e80 15716->15722 15797 7ff733c57010 15717->15797 15720 7ff733c57170 39 API calls 15721 7ff733c56fd7 15720->15721 15721->15707 15723 7ff733c622d0 4 API calls 15722->15723 15724 7ff733c54ea5 15723->15724 15726 7ff733c54ec6 15724->15726 15806 7ff733c514b0 15724->15806 15726->15708 15728 7ff733c5745d 15727->15728 15729 7ff733c56f00 40 API calls 15728->15729 15730 7ff733c52efd 15729->15730 15731 7ff733c56f00 15730->15731 15820 7ff733c5a2a0 15731->15820 15735 7ff733c5b136 15734->15735 15736 7ff733c5b167 15735->15736 15737 7ff733c56a30 41 API calls 15735->15737 15736->15716 15738 7ff733c5b183 15737->15738 15751 7ff733c519b0 15738->15751 15740 7ff733c5b1ab 15758 7ff733c5b0d0 15740->15758 15743 7ff733c5b1dc 15761 7ff733c5b990 15743->15761 15746 7ff733c5b227 15748 7ff733c57170 39 API calls 15746->15748 15747 7ff733c57170 39 API calls 15747->15736 15748->15736 15749 7ff733c5b208 15749->15746 15750 7ff733c5d190 58 API calls 15749->15750 15750->15746 15765 7ff733c516a0 15751->15765 15756 7ff733c57170 39 API calls 15757 7ff733c519fd 15756->15757 15757->15740 15786 7ff733c616e0 15758->15786 15764 7ff733c5b99e 15761->15764 15762 7ff733c5b1f4 15762->15747 15764->15762 15794 7ff733c616a0 FindNextFileW 15764->15794 15766 7ff733c52680 41 API calls 15765->15766 15767 7ff733c516dd 15766->15767 15768 7ff733c57bf0 15767->15768 15769 7ff733c57c0b 15768->15769 15770 7ff733c57c12 15769->15770 15773 7ff733c57c2c 15769->15773 15771 7ff733c574c0 41 API calls 15770->15771 15772 7ff733c519ee 15771->15772 15772->15756 15774 7ff733c57cfd 15773->15774 15778 7ff733c57ce3 15773->15778 15775 7ff733c57d57 15774->15775 15779 7ff733c57d24 15774->15779 15776 7ff733c57d63 15775->15776 15784 7ff733c57d9a 15775->15784 15777 7ff733c57d51 15776->15777 15780 7ff733c5e780 41 API calls 15776->15780 15782 7ff733c5c6a0 41 API calls 15777->15782 15781 7ff733c574c0 41 API calls 15778->15781 15783 7ff733c5d0c0 41 API calls 15779->15783 15780->15777 15781->15772 15782->15772 15783->15777 15784->15777 15785 7ff733c5e780 41 API calls 15784->15785 15785->15777 15787 7ff733c6170b FindFirstFileExW 15786->15787 15788 7ff733c616fe FindClose 15786->15788 15790 7ff733c61736 GetLastError 15787->15790 15791 7ff733c5b0fa 15787->15791 15788->15787 15789 7ff733c6174c 15788->15789 15792 7ff733c6b9c4 39 API calls 15789->15792 15790->15791 15791->15743 15791->15749 15793 7ff733c61751 15792->15793 15795 7ff733c616ae 15794->15795 15796 7ff733c616b5 GetLastError 15794->15796 15795->15764 15800 7ff733c616c0 15797->15800 15801 7ff733c616ca FindClose 15800->15801 15802 7ff733c56fca 15800->15802 15801->15802 15803 7ff733c616d9 15801->15803 15802->15720 15804 7ff733c6b9c4 39 API calls 15803->15804 15805 7ff733c616de 15804->15805 15807 7ff733c514dc 15806->15807 15810 7ff733c525c0 15807->15810 15811 7ff733c525dd 15810->15811 15814 7ff733c55fe0 15811->15814 15815 7ff733c56000 15814->15815 15816 7ff733c57490 39 API calls 15815->15816 15817 7ff733c5603c 15816->15817 15818 7ff733c5b5e0 41 API calls 15817->15818 15819 7ff733c51507 15818->15819 15819->15726 15821 7ff733c5a2b5 15820->15821 15823 7ff733c56f13 15820->15823 15824 7ff733c5a2d0 15821->15824 15823->15704 15825 7ff733c5a2f3 15824->15825 15826 7ff733c5a302 15824->15826 15828 7ff733c5a3b0 15825->15828 15826->15823 15829 7ff733c52a00 40 API calls 15828->15829 15830 7ff733c5a3ca 15829->15830 15830->15826 15835 7ff733c5997b 15831->15835 15832 7ff733c616a0 2 API calls 15832->15835 15833 7ff733c5999e 15849 7ff733c5ec60 15833->15849 15835->15832 15835->15833 15836 7ff733c599cd 15835->15836 15838 7ff733c599ab 15835->15838 15853 7ff733c5b5e0 15836->15853 15838->15689 15840 7ff733c5be83 15839->15840 15841 7ff733c55550 41 API calls 15840->15841 15842 7ff733c5bebe 15841->15842 15873 7ff733c56980 15842->15873 15845 7ff733c63468 2 API calls 15846 7ff733c5bf01 15845->15846 15847 7ff733c56e50 39 API calls 15846->15847 15848 7ff733c5bf0c 15847->15848 15848->15690 15850 7ff733c5ec85 15849->15850 15851 7ff733c56f00 40 API calls 15850->15851 15852 7ff733c5eca3 15851->15852 15852->15838 15854 7ff733c5b607 15853->15854 15855 7ff733c516a0 41 API calls 15854->15855 15856 7ff733c5b63c 15855->15856 15861 7ff733c5eb60 15856->15861 15859 7ff733c57170 39 API calls 15860 7ff733c5b657 15859->15860 15860->15838 15866 7ff733c5ead0 15861->15866 15864 7ff733c57bf0 41 API calls 15865 7ff733c5b64c 15864->15865 15865->15859 15867 7ff733c5eae6 15866->15867 15870 7ff733c5d0c0 15867->15870 15869 7ff733c5eb51 15869->15864 15871 7ff733c5a0b0 41 API calls 15870->15871 15872 7ff733c5d0e7 15871->15872 15872->15869 15874 7ff733c56bb0 41 API calls 15873->15874 15875 7ff733c569bd 15874->15875 15876 7ff733c55550 41 API calls 15875->15876 15877 7ff733c56a16 15876->15877 15877->15845 15879 7ff733c6b271 15878->15879 15881 7ff733c6b295 15878->15881 15880 7ff733c6b276 15879->15880 15879->15881 15883 7ff733c6ae64 11 API calls 15880->15883 15882 7ff733c6b2cf 15881->15882 15885 7ff733c6b2ee 15881->15885 15884 7ff733c6ae64 11 API calls 15882->15884 15886 7ff733c6b27b 15883->15886 15887 7ff733c6b2d4 15884->15887 15888 7ff733c6b188 39 API calls 15885->15888 15889 7ff733c68174 39 API calls 15886->15889 15891 7ff733c68174 39 API calls 15887->15891 15893 7ff733c6b2fb 15888->15893 15890 7ff733c6b286 15889->15890 15890->15138 15892 7ff733c6b2df 15891->15892 15892->15138 15893->15892 15894 7ff733c6eb70 45 API calls 15893->15894 15894->15893 15896 7ff733c5f79b 15895->15896 15896->15144 15898 7ff733c58afa 15897->15898 15899 7ff733c58b04 15897->15899 15900 7ff733c585a0 2 API calls 15898->15900 15915 7ff733c58cf0 15899->15915 15900->15899 15902 7ff733c58b29 15919 7ff733c58ed0 15902->15919 15904 7ff733c585a0 2 API calls 15904->15902 15909 7ff733c58ca0 41 API calls 15910 7ff733c58b64 15909->15910 15930 7ff733c58a50 15910->15930 15913 7ff733c59670 2 API calls 15914 7ff733c58b9f 15913->15914 15916 7ff733c58d03 15915->15916 15934 7ff733c6aa20 15916->15934 15918 7ff733c58b14 15918->15902 15918->15904 15920 7ff733c58ee3 15919->15920 15921 7ff733c58b43 15920->15921 15922 7ff733c58ce0 49 API calls 15920->15922 15923 7ff733c55180 15921->15923 15922->15921 15924 7ff733c55070 2 API calls 15923->15924 15925 7ff733c551a2 15924->15925 15926 7ff733c58600 48 API calls 15925->15926 15927 7ff733c551b2 15926->15927 15928 7ff733c551c8 15927->15928 15929 7ff733c572f0 41 API calls 15927->15929 15928->15909 15929->15928 15931 7ff733c58a6d 15930->15931 16162 7ff733c6ac7c 15931->16162 15935 7ff733c6aa7a 15934->15935 15936 7ff733c6aa9f 15935->15936 15938 7ff733c6aadb 15935->15938 15937 7ff733c680a8 39 API calls 15936->15937 15940 7ff733c6aac9 15937->15940 15954 7ff733c69a98 15938->15954 15941 7ff733c6ac3d 15940->15941 15942 7ff733c67d88 39 API calls 15940->15942 15944 7ff733c67d88 39 API calls 15941->15944 15946 7ff733c6ac53 15941->15946 15942->15941 15943 7ff733c6d7d4 11 API calls 15943->15940 15944->15946 15946->15918 15947 7ff733c6abbc 15947->15943 15948 7ff733c6ab91 15952 7ff733c6d7d4 11 API calls 15948->15952 15949 7ff733c6abe2 15949->15947 15951 7ff733c6abec 15949->15951 15950 7ff733c6ab88 15950->15947 15950->15948 15953 7ff733c6d7d4 11 API calls 15951->15953 15952->15940 15953->15940 15955 7ff733c69ad6 15954->15955 15956 7ff733c69ac6 15954->15956 15957 7ff733c69adf 15955->15957 15963 7ff733c69b0d 15955->15963 15958 7ff733c680a8 39 API calls 15956->15958 15959 7ff733c680a8 39 API calls 15957->15959 15960 7ff733c69b05 15958->15960 15959->15960 15960->15947 15960->15948 15960->15949 15960->15950 15963->15956 15963->15960 15965 7ff733c69f20 15963->15965 15996 7ff733c69d70 15963->15996 16031 7ff733c69730 15963->16031 15966 7ff733c69fd3 15965->15966 15967 7ff733c69f62 15965->15967 15970 7ff733c6a02c 15966->15970 15971 7ff733c69fd8 15966->15971 15968 7ff733c69ffd 15967->15968 15969 7ff733c69f68 15967->15969 16054 7ff733c68edc 15968->16054 15972 7ff733c69f6d 15969->15972 15973 7ff733c69f9c 15969->15973 15977 7ff733c6a036 15970->15977 15978 7ff733c6a043 15970->15978 15982 7ff733c6a03b 15970->15982 15974 7ff733c6a00d 15971->15974 15975 7ff733c69fda 15971->15975 15972->15978 15980 7ff733c69f73 15972->15980 15973->15980 15973->15982 16061 7ff733c68cd0 15974->16061 15976 7ff733c69f7c 15975->15976 15985 7ff733c69fe9 15975->15985 15994 7ff733c6a06c 15976->15994 16034 7ff733c6a404 15976->16034 15977->15968 15977->15982 16068 7ff733c6a7e8 15978->16068 15980->15976 15986 7ff733c69fae 15980->15986 15993 7ff733c69f97 15980->15993 15982->15994 16072 7ff733c690e8 15982->16072 15985->15968 15988 7ff733c69fee 15985->15988 15986->15994 16044 7ff733c6a66c 15986->16044 15988->15994 16050 7ff733c6a730 15988->16050 15993->15994 15995 7ff733c6a258 15993->15995 16079 7ff733c6a900 15993->16079 15994->15963 15995->15994 16086 7ff733c6e744 15995->16086 15997 7ff733c69d7e 15996->15997 15998 7ff733c69d94 15996->15998 15999 7ff733c69fd3 15997->15999 16000 7ff733c69f62 15997->16000 16016 7ff733c69dd4 15997->16016 16001 7ff733c680a8 39 API calls 15998->16001 15998->16016 16003 7ff733c69fd8 15999->16003 16004 7ff733c6a02c 15999->16004 16002 7ff733c69f68 16000->16002 16005 7ff733c69ffd 16000->16005 16001->16016 16006 7ff733c69f6d 16002->16006 16007 7ff733c69f9c 16002->16007 16008 7ff733c6a00d 16003->16008 16009 7ff733c69fda 16003->16009 16011 7ff733c6a036 16004->16011 16012 7ff733c6a043 16004->16012 16017 7ff733c6a03b 16004->16017 16013 7ff733c68edc 40 API calls 16005->16013 16006->16012 16014 7ff733c69f73 16006->16014 16007->16014 16007->16017 16019 7ff733c68cd0 40 API calls 16008->16019 16010 7ff733c69f7c 16009->16010 16022 7ff733c69fe9 16009->16022 16015 7ff733c6a404 40 API calls 16010->16015 16029 7ff733c6a06c 16010->16029 16011->16005 16011->16017 16018 7ff733c6a7e8 39 API calls 16012->16018 16028 7ff733c69f97 16013->16028 16014->16010 16020 7ff733c69fae 16014->16020 16014->16028 16015->16028 16016->15963 16021 7ff733c690e8 40 API calls 16017->16021 16017->16029 16018->16028 16019->16028 16023 7ff733c6a66c 40 API calls 16020->16023 16020->16029 16021->16028 16022->16005 16024 7ff733c69fee 16022->16024 16023->16028 16025 7ff733c6a730 39 API calls 16024->16025 16024->16029 16025->16028 16026 7ff733c6a900 39 API calls 16030 7ff733c6a258 16026->16030 16027 7ff733c6e744 40 API calls 16027->16030 16028->16026 16028->16029 16028->16030 16029->15963 16030->16027 16030->16029 16145 7ff733c68558 16031->16145 16035 7ff733c6a42a 16034->16035 16095 7ff733c683c4 16035->16095 16040 7ff733c6a56f 16042 7ff733c6a900 39 API calls 16040->16042 16043 7ff733c6a5fd 16040->16043 16041 7ff733c6a900 39 API calls 16041->16040 16042->16043 16043->15993 16046 7ff733c6a6a1 16044->16046 16045 7ff733c6a6e6 16045->15993 16046->16045 16047 7ff733c6a6bf 16046->16047 16048 7ff733c6a900 39 API calls 16046->16048 16049 7ff733c6e744 40 API calls 16047->16049 16048->16047 16049->16045 16053 7ff733c6a751 16050->16053 16051 7ff733c680a8 39 API calls 16052 7ff733c6a782 16051->16052 16052->15993 16053->16051 16053->16052 16055 7ff733c68f0f 16054->16055 16056 7ff733c68f3e 16055->16056 16058 7ff733c68ffb 16055->16058 16060 7ff733c68f7b 16056->16060 16125 7ff733c6846c 16056->16125 16059 7ff733c680a8 39 API calls 16058->16059 16059->16060 16060->15993 16062 7ff733c68d03 16061->16062 16064 7ff733c68d32 16062->16064 16065 7ff733c68def 16062->16065 16063 7ff733c6846c 12 API calls 16067 7ff733c68d6f 16063->16067 16064->16063 16064->16067 16066 7ff733c680a8 39 API calls 16065->16066 16066->16067 16067->15993 16069 7ff733c6a82b 16068->16069 16071 7ff733c6a82f 16069->16071 16133 7ff733c6a884 16069->16133 16071->15993 16073 7ff733c6911b 16072->16073 16074 7ff733c6914a 16073->16074 16076 7ff733c69207 16073->16076 16075 7ff733c6846c 12 API calls 16074->16075 16078 7ff733c69187 16074->16078 16075->16078 16077 7ff733c680a8 39 API calls 16076->16077 16077->16078 16078->15993 16080 7ff733c67d88 39 API calls 16079->16080 16081 7ff733c6a917 16080->16081 16137 7ff733c6d8a4 16081->16137 16087 7ff733c6e775 16086->16087 16090 7ff733c6e783 16086->16090 16088 7ff733c6e7a3 16087->16088 16089 7ff733c6a900 39 API calls 16087->16089 16087->16090 16088->16090 16091 7ff733c6e805 16088->16091 16092 7ff733c6e866 16088->16092 16089->16088 16090->15995 16091->16090 16094 7ff733c71474 MultiByteToWideChar 16091->16094 16093 7ff733c71474 MultiByteToWideChar 16092->16093 16093->16090 16094->16090 16096 7ff733c683fb 16095->16096 16102 7ff733c683ea 16095->16102 16097 7ff733c6d810 12 API calls 16096->16097 16096->16102 16098 7ff733c68428 16097->16098 16099 7ff733c6843c 16098->16099 16101 7ff733c6d7d4 11 API calls 16098->16101 16100 7ff733c6d7d4 11 API calls 16099->16100 16100->16102 16101->16099 16103 7ff733c6e45c 16102->16103 16104 7ff733c6e4ac 16103->16104 16105 7ff733c6e479 16103->16105 16104->16105 16107 7ff733c6e4de 16104->16107 16106 7ff733c680a8 39 API calls 16105->16106 16122 7ff733c6a54d 16106->16122 16113 7ff733c6e5f1 16107->16113 16115 7ff733c6e526 16107->16115 16108 7ff733c6e6e3 16109 7ff733c6d948 39 API calls 16108->16109 16109->16122 16110 7ff733c6e6a9 16111 7ff733c6dce0 39 API calls 16110->16111 16111->16122 16112 7ff733c6e678 16114 7ff733c6dfc0 39 API calls 16112->16114 16113->16108 16113->16110 16113->16112 16116 7ff733c6e63b 16113->16116 16117 7ff733c6e631 16113->16117 16114->16122 16120 7ff733c6cfe0 39 API calls 16115->16120 16115->16122 16118 7ff733c6e1f0 39 API calls 16116->16118 16117->16110 16119 7ff733c6e636 16117->16119 16118->16122 16119->16112 16119->16116 16121 7ff733c6e5de 16120->16121 16121->16122 16123 7ff733c681c4 9 API calls 16121->16123 16122->16040 16122->16041 16124 7ff733c6e740 16123->16124 16126 7ff733c684a3 16125->16126 16132 7ff733c68492 16125->16132 16127 7ff733c6d810 12 API calls 16126->16127 16126->16132 16128 7ff733c684d4 16127->16128 16129 7ff733c6d7d4 11 API calls 16128->16129 16131 7ff733c684e8 16128->16131 16129->16131 16130 7ff733c6d7d4 11 API calls 16130->16132 16131->16130 16132->16060 16134 7ff733c6a8aa 16133->16134 16135 7ff733c6a8a2 16133->16135 16134->16071 16136 7ff733c6a900 39 API calls 16135->16136 16136->16134 16138 7ff733c6d8bd 16137->16138 16139 7ff733c6a93f 16137->16139 16138->16139 16140 7ff733c720fc 39 API calls 16138->16140 16141 7ff733c6d910 16139->16141 16140->16139 16142 7ff733c6d929 16141->16142 16143 7ff733c6a94f 16141->16143 16142->16143 16144 7ff733c71108 39 API calls 16142->16144 16143->15995 16144->16143 16146 7ff733c6858d 16145->16146 16147 7ff733c6859f 16145->16147 16148 7ff733c6ae64 11 API calls 16146->16148 16150 7ff733c685ad 16147->16150 16154 7ff733c685e9 16147->16154 16149 7ff733c68592 16148->16149 16151 7ff733c68174 39 API calls 16149->16151 16152 7ff733c680a8 39 API calls 16150->16152 16161 7ff733c6859d 16151->16161 16152->16161 16153 7ff733c68965 16155 7ff733c6ae64 11 API calls 16153->16155 16153->16161 16154->16153 16156 7ff733c6ae64 11 API calls 16154->16156 16157 7ff733c68bf9 16155->16157 16158 7ff733c6895a 16156->16158 16159 7ff733c68174 39 API calls 16157->16159 16160 7ff733c68174 39 API calls 16158->16160 16159->16161 16160->16153 16161->15963 16163 7ff733c6acb5 16162->16163 16166 7ff733c6acf8 16163->16166 16172 7ff733c6820c 16163->16172 16164 7ff733c680a8 39 API calls 16167 7ff733c6ad37 16164->16167 16166->16164 16166->16167 16168 7ff733c6ad5d 16167->16168 16169 7ff733c67d88 39 API calls 16167->16169 16170 7ff733c58a9e 16168->16170 16171 7ff733c67d88 39 API calls 16168->16171 16169->16168 16170->15913 16171->16170 16173 7ff733c6827b 16172->16173 16174 7ff733c6824f 16172->16174 16173->16174 16175 7ff733c68285 16173->16175 16176 7ff733c680a8 39 API calls 16174->16176 16181 7ff733c697c0 16175->16181 16178 7ff733c68273 16176->16178 16178->16166 16182 7ff733c697fe 16181->16182 16187 7ff733c697ee 16181->16187 16183 7ff733c69807 16182->16183 16189 7ff733c69835 16182->16189 16189->16187 16202 7ff733c6d474 39 API calls 16201->16202 16203 7ff733c6b751 16202->16203 16204 7ff733c6b9c4 39 API calls 16203->16204 16205 7ff733c6b771 16204->16205 16206 7ff733c6b791 16205->16206 16207 7ff733c6b782 GetLastError ExitThread 16205->16207 16208 7ff733c6d474 39 API calls 16206->16208 16209 7ff733c6b796 16208->16209 16218 7ff733c6f458 16209->16218 16212 7ff733c6b7af 16222 7ff733c60650 16212->16222 16214 7ff733c6b7ce 16231 7ff733c6b988 16214->16231 16219 7ff733c6b7a2 16218->16219 16220 7ff733c6f467 16218->16220 16219->16212 16228 7ff733c6f2ec 16219->16228 16220->16219 16234 7ff733c6f0b8 16220->16234 16223 7ff733c60677 16222->16223 16247 7ff733c60930 16223->16247 16227 7ff733c606db 16227->16214 16229 7ff733c6eea4 5 API calls 16228->16229 16230 7ff733c6f313 16229->16230 16230->16212 16414 7ff733c6b7e4 16231->16414 16237 7ff733c6eea4 16234->16237 16238 7ff733c6ef01 16237->16238 16239 7ff733c6eefc 16237->16239 16238->16219 16239->16238 16240 7ff733c6ef31 LoadLibraryExW 16239->16240 16241 7ff733c6f026 GetProcAddress 16239->16241 16246 7ff733c6ef90 LoadLibraryExW 16239->16246 16242 7ff733c6f006 16240->16242 16243 7ff733c6ef56 GetLastError 16240->16243 16241->16238 16245 7ff733c6f037 16241->16245 16242->16241 16244 7ff733c6f01d FreeLibrary 16242->16244 16243->16239 16244->16241 16245->16238 16246->16239 16246->16242 16248 7ff733c550f0 41 API calls 16247->16248 16249 7ff733c6096f 16248->16249 16250 7ff733c550f0 41 API calls 16249->16250 16251 7ff733c609a4 16250->16251 16269 7ff733c60de0 16251->16269 16252 7ff733c606d6 16254 7ff733c61d24 16252->16254 16255 7ff733c61d44 16254->16255 16393 7ff733c6200c 16255->16393 16257 7ff733c61d52 16259 7ff733c61df6 16257->16259 16263 7ff733c61e0a 16257->16263 16266 7ff733c61d6a 16257->16266 16258 7ff733c61f38 49 API calls 16260 7ff733c61e15 16258->16260 16261 7ff733c61f38 49 API calls 16259->16261 16261->16263 16262 7ff733c61dd6 16264 7ff733c6202c 16262->16264 16265 7ff733c6201e ReleaseSRWLockExclusive 16262->16265 16263->16258 16264->16227 16265->16264 16266->16262 16407 7ff733c62014 16266->16407 16410 7ff733c62168 WakeAllConditionVariable 16266->16410 16270 7ff733c55810 41 API calls 16269->16270 16283 7ff733c60e17 16270->16283 16271 7ff733c61061 16272 7ff733c56e80 39 API calls 16271->16272 16277 7ff733c6106e 16272->16277 16273 7ff733c5d370 66 API calls 16273->16283 16275 7ff733c56e80 39 API calls 16275->16283 16276 7ff733c5dad0 65 API calls 16276->16283 16277->16252 16278 7ff733c61042 SleepEx 16280 7ff733c56e80 39 API calls 16278->16280 16279 7ff733c51580 41 API calls 16279->16283 16280->16283 16281 7ff733c56530 71 API calls 16281->16283 16282 7ff733c57170 39 API calls 16282->16283 16283->16271 16283->16273 16283->16275 16283->16276 16283->16278 16283->16279 16283->16281 16283->16282 16284 7ff733c5c920 40 API calls 16283->16284 16285 7ff733c5cfd0 40 API calls 16283->16285 16286 7ff733c570d0 40 API calls 16283->16286 16287 7ff733c57700 41 API calls 16283->16287 16289 7ff733c57760 44 API calls 16283->16289 16291 7ff733c60fcd 16283->16291 16292 7ff733c60600 16283->16292 16284->16283 16285->16283 16286->16283 16287->16283 16289->16283 16291->16283 16295 7ff733c5ed50 16291->16295 16335 7ff733c60d90 16291->16335 16341 7ff733c60c00 16292->16341 16294 7ff733c6062a 16294->16283 16296 7ff733c5ed8f 16295->16296 16297 7ff733c58f80 60 API calls 16296->16297 16298 7ff733c5ed9c 16297->16298 16299 7ff733c55120 58 API calls 16298->16299 16300 7ff733c5edc3 16299->16300 16301 7ff733c5ee9e 16300->16301 16302 7ff733c5ff20 41 API calls 16300->16302 16304 7ff733c55120 58 API calls 16301->16304 16303 7ff733c5ee20 16302->16303 16306 7ff733c55120 58 API calls 16303->16306 16305 7ff733c5eec5 16304->16305 16308 7ff733c551e0 51 API calls 16305->16308 16307 7ff733c5ee55 16306->16307 16309 7ff733c572c0 41 API calls 16307->16309 16310 7ff733c5eee5 16308->16310 16311 7ff733c5ee82 16309->16311 16313 7ff733c589f0 59 API calls 16310->16313 16312 7ff733c56e80 39 API calls 16311->16312 16312->16301 16314 7ff733c5f020 16313->16314 16315 7ff733c5f02e CreateFileW 16314->16315 16316 7ff733c5f0a8 GetFileSize 16315->16316 16334 7ff733c5f06b 16315->16334 16317 7ff733c5f109 16316->16317 16318 7ff733c5f0c0 CloseHandle 16316->16318 16319 7ff733c5f17a ReadFile 16317->16319 16320 7ff733c5f131 CloseHandle 16317->16320 16318->16334 16321 7ff733c5f1a8 CloseHandle 16319->16321 16322 7ff733c5f23a CloseHandle WinHttpOpen 16319->16322 16320->16334 16321->16334 16323 7ff733c5f2f9 16322->16323 16322->16334 16324 7ff733c5f306 WinHttpConnect 16323->16324 16325 7ff733c5f32d WinHttpCloseHandle 16324->16325 16326 7ff733c5f3b6 16324->16326 16325->16334 16327 7ff733c5f3c3 WinHttpOpenRequest 16326->16327 16328 7ff733c5f49a WinHttpSendRequest 16327->16328 16329 7ff733c5f406 WinHttpCloseHandle WinHttpCloseHandle 16327->16329 16330 7ff733c5f578 WinHttpReceiveResponse 16328->16330 16331 7ff733c5f4d0 WinHttpCloseHandle WinHttpCloseHandle WinHttpCloseHandle 16328->16331 16329->16334 16332 7ff733c5f58d WinHttpCloseHandle WinHttpCloseHandle WinHttpCloseHandle 16330->16332 16333 7ff733c5f635 WinHttpCloseHandle WinHttpCloseHandle WinHttpCloseHandle 16330->16333 16331->16334 16332->16334 16333->16334 16334->16291 16336 7ff733c60da3 16335->16336 16357 7ff733c61adc 16336->16357 16338 7ff733c60dab 16339 7ff733c5bf20 46 API calls 16338->16339 16340 7ff733c60dcc 16338->16340 16339->16340 16340->16291 16342 7ff733c60c18 16341->16342 16345 7ff733c5c6a0 16342->16345 16344 7ff733c60c32 16344->16294 16346 7ff733c5c75f 16345->16346 16348 7ff733c5c6de 16345->16348 16349 7ff733c53520 16346->16349 16348->16344 16350 7ff733c53572 16349->16350 16351 7ff733c5c2e0 41 API calls 16350->16351 16352 7ff733c53586 16350->16352 16351->16352 16353 7ff733c51d00 41 API calls 16352->16353 16354 7ff733c535e5 16353->16354 16355 7ff733c5a260 39 API calls 16354->16355 16356 7ff733c53686 16354->16356 16355->16356 16356->16348 16358 7ff733c61a84 2 API calls 16357->16358 16359 7ff733c61b21 16358->16359 16360 7ff733c61b27 16359->16360 16363 7ff733c61a84 2 API calls 16359->16363 16367 7ff733c61ccf 16359->16367 16361 7ff733c61b2a SetFileInformationByHandle 16360->16361 16368 7ff733c61b50 16360->16368 16362 7ff733c61bcc GetLastError 16361->16362 16361->16368 16364 7ff733c61bd9 16362->16364 16363->16360 16364->16368 16387 7ff733c61534 SetFileInformationByHandle 16364->16387 16366 7ff733c61b98 CloseHandle 16366->16367 16370 7ff733c61ba6 16366->16370 16371 7ff733c6b9c4 39 API calls 16367->16371 16368->16366 16368->16370 16370->16338 16372 7ff733c61cf6 16371->16372 16374 7ff733c6b9c4 39 API calls 16372->16374 16373 7ff733c61c09 GetFileInformationByHandleEx 16375 7ff733c61c4f 16373->16375 16376 7ff733c61c22 16373->16376 16379 7ff733c61cfc 16374->16379 16378 7ff733c61c56 SetFileInformationByHandle 16375->16378 16384 7ff733c61c2f 16375->16384 16377 7ff733c61c26 GetLastError 16376->16377 16377->16384 16378->16376 16380 7ff733c61c72 16378->16380 16382 7ff733c61534 4 API calls 16380->16382 16381 7ff733c61c39 CloseHandle 16381->16370 16381->16372 16383 7ff733c61c7a 16382->16383 16383->16384 16385 7ff733c61c8c SetFileInformationByHandle 16383->16385 16386 7ff733c61cba GetLastError 16383->16386 16384->16370 16384->16381 16385->16377 16385->16384 16386->16368 16388 7ff733c6155e GetLastError 16387->16388 16389 7ff733c615a3 16387->16389 16390 7ff733c6157a SetFileInformationByHandle 16388->16390 16392 7ff733c6156b 16388->16392 16389->16368 16389->16373 16390->16389 16391 7ff733c6159b GetLastError 16390->16391 16391->16389 16392->16389 16392->16390 16394 7ff733c62034 GetCurrentThreadId 16393->16394 16395 7ff733c6208d 16394->16395 16396 7ff733c62073 16394->16396 16398 7ff733c620a6 16395->16398 16399 7ff733c62092 16395->16399 16397 7ff733c62078 AcquireSRWLockExclusive 16396->16397 16404 7ff733c62085 16396->16404 16397->16404 16401 7ff733c620eb 16398->16401 16405 7ff733c620b4 16398->16405 16400 7ff733c6209a AcquireSRWLockExclusive 16399->16400 16399->16404 16400->16404 16402 7ff733c620f3 TryAcquireSRWLockExclusive 16401->16402 16401->16404 16402->16404 16404->16257 16405->16404 16406 7ff733c620db TryAcquireSRWLockExclusive 16405->16406 16411 7ff733c613dc 16405->16411 16406->16404 16406->16405 16408 7ff733c6202c 16407->16408 16409 7ff733c6201e ReleaseSRWLockExclusive 16407->16409 16408->16266 16409->16408 16410->16266 16412 7ff733c61418 GetSystemTimeAsFileTime 16411->16412 16413 7ff733c613ea 16412->16413 16413->16405 16415 7ff733c6d5ec 11 API calls 16414->16415 16417 7ff733c6b7f5 16415->16417 16416 7ff733c6b83c ExitThread 16417->16416 16418 7ff733c6b811 16417->16418 16423 7ff733c6f338 16417->16423 16420 7ff733c6b825 16418->16420 16421 7ff733c6b81f CloseHandle 16418->16421 16420->16416 16422 7ff733c6b833 FreeLibraryAndExitThread 16420->16422 16421->16420 16422->16416 16424 7ff733c6eea4 5 API calls 16423->16424 16425 7ff733c6f35b 16424->16425 16425->16418 16481 7ff733c6b748 16482 7ff733c6d474 39 API calls 16481->16482 16483 7ff733c6b751 16482->16483 16484 7ff733c6b9c4 39 API calls 16483->16484 16485 7ff733c6b771 16484->16485 16486 7ff733c6b791 16485->16486 16487 7ff733c6b782 GetLastError ExitThread 16485->16487 16488 7ff733c6d474 39 API calls 16486->16488 16489 7ff733c6b796 16488->16489 16490 7ff733c6f458 5 API calls 16489->16490 16491 7ff733c6b7a2 16490->16491 16492 7ff733c6b7af 16491->16492 16493 7ff733c6f2ec 5 API calls 16491->16493 16497 7ff733c60650 167 API calls 16492->16497 16493->16492 16494 7ff733c6b7ce 16495 7ff733c6b988 19 API calls 16494->16495 16496 7ff733c6b7d5 16495->16496 16497->16494

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Find$CloseErrorFileFirstLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4020440971-0
                                                                                                                                                                                                                                                      • Opcode ID: e02e20e4b83b26634b4baf94957bb0f30797227da8768f13bad89269cfc44f46
                                                                                                                                                                                                                                                      • Instruction ID: e7ee77ad963f5bf650fdd8a1072e122ee07be0091f6ba6a1d612791ce4d0308f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e02e20e4b83b26634b4baf94957bb0f30797227da8768f13bad89269cfc44f46
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 02018435608A4192E7B06B21E404329A360FF44BB6F584730DBBD17BD4DF3DD0458610

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseHandle
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2962429428-0
                                                                                                                                                                                                                                                      • Opcode ID: 7ff172f853f716cf9d1d95beeae36b4e8047d7bdc4e9e7ba24e55602a09b8d48
                                                                                                                                                                                                                                                      • Instruction ID: cf3557ac7d609d3941fbcfcc4a130db34bf3449a2eeb28b93a8f1e801f810b19
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7ff172f853f716cf9d1d95beeae36b4e8047d7bdc4e9e7ba24e55602a09b8d48
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5511336591C682A1FBB0BB22E45537AE3A0FFC4745F805132D98E566E9DE2CE508A710

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressFreeLibraryProc
                                                                                                                                                                                                                                                      • String ID: api-ms-$ext-ms-
                                                                                                                                                                                                                                                      • API String ID: 3013587201-537541572
                                                                                                                                                                                                                                                      • Opcode ID: c185431dbb19fcf82ad9b5b31b2ce025036c609ab17a4281bf9476a3cdcb7b35
                                                                                                                                                                                                                                                      • Instruction ID: 9c82695d04420da9333e4ab6b9de954179b730fefe368ae1c846e82f3b3ebf7c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c185431dbb19fcf82ad9b5b31b2ce025036c609ab17a4281bf9476a3cdcb7b35
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 11413631B19A1262FBB6EB269D04575A384BF45BD0F884236DD0DB73D0EE3CE405A320

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CommandLine$Argv
                                                                                                                                                                                                                                                      • String ID: guid$rid$ver
                                                                                                                                                                                                                                                      • API String ID: 1106129467-406373251
                                                                                                                                                                                                                                                      • Opcode ID: 3ab06b3f2be436757fc9abc811d322d12142cd6a00f6de1983ba124b4525124c
                                                                                                                                                                                                                                                      • Instruction ID: 161f1e1c01b9d1f77b0fb206e4a4d3bc59f592951a9589d9edda00c64a637ab6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3ab06b3f2be436757fc9abc811d322d12142cd6a00f6de1983ba124b4525124c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F091727261E981A1EAB1FB15E8412FEE360FBD5340FC05132E68D93AEADE2CD544DB10

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileModuleNameSleep
                                                                                                                                                                                                                                                      • String ID: .dmp$\Errors$pcapp.store
                                                                                                                                                                                                                                                      • API String ID: 4084727719-915841659
                                                                                                                                                                                                                                                      • Opcode ID: 34164a50329504c101d40668c8c4b26a2f807f33b371eee3f07fa31bbf95ecf5
                                                                                                                                                                                                                                                      • Instruction ID: 540ad0071afc68c476192f76287b6f19c12200e9f2438f0f0154a51cf7d7031f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 34164a50329504c101d40668c8c4b26a2f807f33b371eee3f07fa31bbf95ecf5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AD61F37254DAC6A0EAB0FB11E4512FEE360EBD5340FC05532E68D63AEADE2CD549DB10

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCreateErrorFreeHandleLastLibraryThread
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3065451008-0
                                                                                                                                                                                                                                                      • Opcode ID: c41850e104b0051c50784e11e98d8d5637d48d98f0395a28d3139850bd2f79f4
                                                                                                                                                                                                                                                      • Instruction ID: a9a248674a6d921d701342c3d7a084c4e40f54d8fa28ca8be2419561aca56b52
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c41850e104b0051c50784e11e98d8d5637d48d98f0395a28d3139850bd2f79f4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E8214125A09B4295EEA5FF62A410179E3A0FF88B80F884535EE4D637E5DE3CE400A720

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$CreateQueryValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2495337196-0
                                                                                                                                                                                                                                                      • Opcode ID: 17b25bd4390967a9587d4a92535a0f257787871192029a1f274db37254ea4fe6
                                                                                                                                                                                                                                                      • Instruction ID: 55113b8e605b8ce4b5d0850023170e504e974d7c07d824529d2bd666e3e8e553
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 17b25bd4390967a9587d4a92535a0f257787871192029a1f274db37254ea4fe6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 47210C7651CA8196E7A0AB12E4402AAF3A4FBC8791F901435EACE53B69CF7CD0549B10

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCreateQueryValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4083198587-0
                                                                                                                                                                                                                                                      • Opcode ID: ad1ada592d427fa2048b348dcfbe489511d96a446958a8376f5abf4de5c1af61
                                                                                                                                                                                                                                                      • Instruction ID: e114b64dba67f06b27527f9dd2c295de42fe1dc10ea080d3d2a86515bee26d85
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ad1ada592d427fa2048b348dcfbe489511d96a446958a8376f5abf4de5c1af61
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 12310E72618A8596E7A0EB21E4513ABF361FBC4780F804132EACE53BA9DF3CD4049B50

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetEnvironmentStringsW.KERNEL32(?,?,00000000,00007FF733C6C516), ref: 00007FF733C71518
                                                                                                                                                                                                                                                      • FreeEnvironmentStringsW.KERNEL32(?,?,00000000,00007FF733C6C516), ref: 00007FF733C71582
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: EnvironmentStrings$Free
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3328510275-0
                                                                                                                                                                                                                                                      • Opcode ID: 28f9276106675523283c812fbedf3e64e62ab084bec685b1639a7ce59819b0a3
                                                                                                                                                                                                                                                      • Instruction ID: 51d5b9e13e3949480d2aaf84c1e68a0f26262ecde1c98e7abd9055ea4789bd82
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 28f9276106675523283c812fbedf3e64e62ab084bec685b1639a7ce59819b0a3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A701A511E0875555EAB4BB126414029A360AB54FE1B8C4634DF6F237C5DE2CE4429360

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$ExitThreadValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 10640732-0
                                                                                                                                                                                                                                                      • Opcode ID: 90fdddd3eb205539202c4318c00bea3395450c08f9a506176d645988f686903c
                                                                                                                                                                                                                                                      • Instruction ID: 0eb0177853d43b2389b74ffcb76ec2ff926ee5ee855ab1d3b55deae714e2c7d8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 90fdddd3eb205539202c4318c00bea3395450c08f9a506176d645988f686903c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CF01B115E4D642A2EFB8BBB2945517C9260AF15B81F880530DD0D673E2DF2CF800E330

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CommandLine$ArgvSleep
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 138401787-0
                                                                                                                                                                                                                                                      • Opcode ID: efc16b36b096ab38884258b42e855036f3c903c840d3c5b9257e4f5e7d884684
                                                                                                                                                                                                                                                      • Instruction ID: e9041b2a9763b6f5dc18ed23273e1d81b476704126e7a64d7de7fb7521e38b56
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: efc16b36b096ab38884258b42e855036f3c903c840d3c5b9257e4f5e7d884684
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8521D16262C946A1EAB0FB11E4510FAA724FBD4344FD05132F28E525EADF2CD649D760

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FolderPath
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1514166925-0
                                                                                                                                                                                                                                                      • Opcode ID: bd96bbac574e02d815f024f9da997c6aa16a9fbb067187f294747842f3599125
                                                                                                                                                                                                                                                      • Instruction ID: 9af6caeadfff95c6dd6752644d9a40e20c8cef07cb93502be74dd0b9d77153c1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bd96bbac574e02d815f024f9da997c6aa16a9fbb067187f294747842f3599125
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 69113376629A8196E7A0EB25F49536AB364F7C5340FC05136EA8E43B99DF3CD0059F10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(?,?,?,?,00007FF733C57026,?,?,?,?,00007FF733C56FFA,?,?,?,?,00007FF733C57F67), ref: 00007FF733C616CA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseFind
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1863332320-0
                                                                                                                                                                                                                                                      • Opcode ID: 6633c3bcbba3947fc1ff88d8d51966f5783bac20f3982bfd658da65195a1ac88
                                                                                                                                                                                                                                                      • Instruction ID: cc001b92f1c96e9e205d313ed4222298cd8c2153270e56fa848a1db6fb1e0233
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6633c3bcbba3947fc1ff88d8d51966f5783bac20f3982bfd658da65195a1ac88
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 71C01228E18103A6F9B83372084A0308190AF10332FDC0730D23D21AD0AE6DA4562A21
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileFindNext
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2029273394-0
                                                                                                                                                                                                                                                      • Opcode ID: 45b1598d97b18590ee1f375a1dc0b7122017cf018a2283715a306612294b10c7
                                                                                                                                                                                                                                                      • Instruction ID: b51c55759b7fec3994978a651aa0b4dadbda7fa505764462a8247ef35ddb35e2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 45b1598d97b18590ee1f375a1dc0b7122017cf018a2283715a306612294b10c7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C2C04C19F19502E6E7A83B735C821655290AB44752FD80570C50D90390DD6D91E76621
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseHandle
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2962429428-0
                                                                                                                                                                                                                                                      • Opcode ID: e59d26789168c431688b0075b1b8ca6d55948675341b6ac14088dc12283067ef
                                                                                                                                                                                                                                                      • Instruction ID: 4e2cfeb7f7f8d6bacbe237d4a327290d0461ff050841f07df0e702377938b336
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e59d26789168c431688b0075b1b8ca6d55948675341b6ac14088dc12283067ef
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: ADB09B5AF65401D1AB046736DC4352812506755B0BFD05530C50FD1250DD1ED19D4700
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseFileHandle$CreateSize
                                                                                                                                                                                                                                                      • String ID: /uploader.php?src=crash_dump&guid=%ws&version=%ws&t=%ws&f=%ws$POST$WinHTTP 1.0
                                                                                                                                                                                                                                                      • API String ID: 4148174661-2094466245
                                                                                                                                                                                                                                                      • Opcode ID: d66bd778d5971530c4d5da606024a718cc853c75d13cdbc55e7725838a953cf2
                                                                                                                                                                                                                                                      • Instruction ID: ebcc274e1b46a245b5524d3d97c8df51b15859b8ec11aaa6a9e96d9c1bd4484a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d66bd778d5971530c4d5da606024a718cc853c75d13cdbc55e7725838a953cf2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5B32D67264DAC2A5E6B0EB11E4903EAB360FBC5751F901132DA8D92BE9DF3DD4449B20
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$ErrorFileFindHandleLast$AttributesFirst
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2606427991-0
                                                                                                                                                                                                                                                      • Opcode ID: b6ecde4f903c2883d93325be714976cdaba6638d5a70c55a607f0d5a940453cf
                                                                                                                                                                                                                                                      • Instruction ID: 5758a9cb3a9afe43d81b599b971a8028094f82b80d5b006e2f924ec33aae205c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b6ecde4f903c2883d93325be714976cdaba6638d5a70c55a607f0d5a940453cf
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1091A631B18A0296F7F46B25A800679A390AF857B6F9C0730D9EE677D4DF3CE405A720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3140674995-0
                                                                                                                                                                                                                                                      • Opcode ID: adb06ce9056d2fa316cb4cefb88309d9df19e0785e351ef7a27dbbc2f3529d70
                                                                                                                                                                                                                                                      • Instruction ID: 4f73e3053978be8f47cc97ffcd558f651787d898138b7ccc9dc54ab312aff7ed
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: adb06ce9056d2fa316cb4cefb88309d9df19e0785e351ef7a27dbbc2f3529d70
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DD315276609B819AEBB0AF60E8403EDB364FB84705F844439DA4E57B94DF3DD548D720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1239891234-0
                                                                                                                                                                                                                                                      • Opcode ID: ca1ea65e0aa9df2e334f5caa7b5a0b7e61ba4497c43f70bdc7606808fac1e5f5
                                                                                                                                                                                                                                                      • Instruction ID: 3ea9f6c621c504bfafea4d2700f971ff096492051cf485e9432947823e6c5690
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ca1ea65e0aa9df2e334f5caa7b5a0b7e61ba4497c43f70bdc7606808fac1e5f5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AF31B236608B819ADBB0DF25E8402AEB3A4FB88754F940135EE9D53B98DF3CD555CB10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileFindFirst
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1974802433-0
                                                                                                                                                                                                                                                      • Opcode ID: 48bf857745ad3340444eaa65f69a2c85be334b34f5db06f4dd54ac080bcff7b2
                                                                                                                                                                                                                                                      • Instruction ID: 06e5bdea225709d78ed850d1087d3f23ead6b592602ac49c85a808407c280d1d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 48bf857745ad3340444eaa65f69a2c85be334b34f5db06f4dd54ac080bcff7b2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4BB1D462B186A255EAF0FB21D4102B9E3A0FB84BE5F845131EE5D67BC5DE3CE441E320
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FormatInfoLocaleMessage
                                                                                                                                                                                                                                                      • String ID: !x-sys-default-locale
                                                                                                                                                                                                                                                      • API String ID: 4235545615-2729719199
                                                                                                                                                                                                                                                      • Opcode ID: c00fe59d010b592f34e97a7aa47030643ae95c4475d4667763cfb222f8a0884b
                                                                                                                                                                                                                                                      • Instruction ID: e7f3c8165008f1aadb43bd1dae64c5dce007aaf3a9e5c49a10b6c127bddb21bd
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c00fe59d010b592f34e97a7aa47030643ae95c4475d4667763cfb222f8a0884b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B601C072B0878697E7A19B22B400B7AA7A1FB8478AF884035DA8D57BC4CF3CD505D710
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d9a6b6575e2cc0ac60b452e4a2ee9eba7ff89086e9f9accccabc269ea24c7a1f
                                                                                                                                                                                                                                                      • Instruction ID: cdb055fc5d4ca90fb0473651a555810fce18a9348a129b06131060063a3142d7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d9a6b6575e2cc0ac60b452e4a2ee9eba7ff89086e9f9accccabc269ea24c7a1f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DBF068717192559ADBE4AF29B443629B7D0F708380F90C079D58D87F44D63C9560AF14
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressProc$HandleModule
                                                                                                                                                                                                                                                      • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                                                                                                                                                                                      • API String ID: 667068680-1247241052
                                                                                                                                                                                                                                                      • Opcode ID: 3d15b3eb9c653fb8bf89469f404861b15e1afa8f9eef01833a572815d434d3a0
                                                                                                                                                                                                                                                      • Instruction ID: e9a95317ae6f3b7070b461ed5ace3bd32d69b6efc349356c2c2c8564b018401f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3d15b3eb9c653fb8bf89469f404861b15e1afa8f9eef01833a572815d434d3a0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1641B0A2E04B46A5FB60EB65E8441FDA360BF447A5F944331DE6C27AE5DF3CE1819310
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressProc$ExceptionFileHandleHeaderModuleRaise
                                                                                                                                                                                                                                                      • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                                                                                                                                                                                      • API String ID: 1039895991-1247241052
                                                                                                                                                                                                                                                      • Opcode ID: aad61275c4aaed5e5a771c555530a4604ff018f85168bf9ab42cd60621da80d4
                                                                                                                                                                                                                                                      • Instruction ID: 19108c66efc4854be13c56976f1954bd68624465b642ff395ea4f747176215d6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aad61275c4aaed5e5a771c555530a4604ff018f85168bf9ab42cd60621da80d4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DA115A65A08B4BB2EA60BB51E8444B9A3A0FF44745FC04031C94C277A0DF3CE155D360
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Handle$File$ErrorInformationLast$Close$CreateFeaturePresentProcessor
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3900632423-0
                                                                                                                                                                                                                                                      • Opcode ID: 824f1bed34943def979c0d0214c01812a96222b04afe7db87c2e753b0ce8e6fd
                                                                                                                                                                                                                                                      • Instruction ID: d41f9f485c6727cebd1b3bac209595e68bced17ea6c59605762bfd039df7aa47
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 824f1bed34943def979c0d0214c01812a96222b04afe7db87c2e753b0ce8e6fd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0151E771F08242A9F7B0ABB598001BC7BA0AF44799F9C0239CD5E77BD4DF29E001A320
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF733C67C2E,?,?,?,00007FF733C6787C,?,?,?,00007FF733C641D5), ref: 00007FF733C67A01
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,00007FF733C67C2E,?,?,?,00007FF733C6787C,?,?,?,00007FF733C641D5), ref: 00007FF733C67A0F
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF733C67C2E,?,?,?,00007FF733C6787C,?,?,?,00007FF733C641D5), ref: 00007FF733C67A39
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF733C67C2E,?,?,?,00007FF733C6787C,?,?,?,00007FF733C641D5), ref: 00007FF733C67AA7
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF733C67C2E,?,?,?,00007FF733C6787C,?,?,?,00007FF733C641D5), ref: 00007FF733C67AB3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                                                                                                                                                      • String ID: api-ms-
                                                                                                                                                                                                                                                      • API String ID: 2559590344-2084034818
                                                                                                                                                                                                                                                      • Opcode ID: 8cdb4187fcaf004885bb0e745a66ecdd46c3b050bffe59f58c31e6f610cb56a3
                                                                                                                                                                                                                                                      • Instruction ID: c153d5b166d2e789a169c469334e8e1c2561892bb008b45baeaa9538300480fa
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8cdb4187fcaf004885bb0e745a66ecdd46c3b050bffe59f58c31e6f610cb56a3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5C310721B1A642A5EEB2BB029800675A3D8FF44B60F9D1936EE1D673D1EF3DE5409320
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Value$ErrorLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2506987500-0
                                                                                                                                                                                                                                                      • Opcode ID: f515d9795231e408bbb0356a4991ab6e25ae0e160ff9a246b8f1d58843594bfd
                                                                                                                                                                                                                                                      • Instruction ID: 20e99a4cd38775c5fe431140cc10cb157e5d93e5f527ee6a05ff7c45b13a9853
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f515d9795231e408bbb0356a4991ab6e25ae0e160ff9a246b8f1d58843594bfd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A8215E24A0C24262FAF47761A569139D2915F487F4F9C1738E92E36AD6DE2DB841A320
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                                                                                                                                                      • String ID: CONOUT$
                                                                                                                                                                                                                                                      • API String ID: 3230265001-3130406586
                                                                                                                                                                                                                                                      • Opcode ID: 67853ad06372b78b906bdc1da9b46fb4dda85c41ca54111b063b4663a2b5b867
                                                                                                                                                                                                                                                      • Instruction ID: 5ac5c12955d1d872a773f69e12f2de6acd901238481d2f6066c614b5a485948b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 67853ad06372b78b906bdc1da9b46fb4dda85c41ca54111b063b4663a2b5b867
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4911E921718A418AE7A0AB12E844369F3A0FB48FE5F844234DD5E57BD4DF3CD9148710
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,0000B26730E074E2,00007FF733C6AE6D,?,?,?,?,00007FF733C701EA,?,?,00000000,00007FF733C6BC1F,?,?,?), ref: 00007FF733C6D5FB
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,0000B26730E074E2,00007FF733C6AE6D,?,?,?,?,00007FF733C701EA,?,?,00000000,00007FF733C6BC1F,?,?,?), ref: 00007FF733C6D631
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,0000B26730E074E2,00007FF733C6AE6D,?,?,?,?,00007FF733C701EA,?,?,00000000,00007FF733C6BC1F,?,?,?), ref: 00007FF733C6D65E
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,0000B26730E074E2,00007FF733C6AE6D,?,?,?,?,00007FF733C701EA,?,?,00000000,00007FF733C6BC1F,?,?,?), ref: 00007FF733C6D66F
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,0000B26730E074E2,00007FF733C6AE6D,?,?,?,?,00007FF733C701EA,?,?,00000000,00007FF733C6BC1F,?,?,?), ref: 00007FF733C6D680
                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(?,?,0000B26730E074E2,00007FF733C6AE6D,?,?,?,?,00007FF733C701EA,?,?,00000000,00007FF733C6BC1F,?,?,?), ref: 00007FF733C6D69B
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Value$ErrorLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2506987500-0
                                                                                                                                                                                                                                                      • Opcode ID: d0c03b59b6ac36dbbc30015e82dff35b2a931ed0503b7f4a7d1536ea9650f947
                                                                                                                                                                                                                                                      • Instruction ID: 50b0b95f2ea8fdc4e9531bb28f84a5b02b0e44780600e87146a59abebfb44310
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d0c03b59b6ac36dbbc30015e82dff35b2a931ed0503b7f4a7d1536ea9650f947
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BA118E24A0C24262FAF4B761A569039D2925F487B4F881B35E82E366D6DE2DF4426720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$CurrentDirectory$EnvironmentVariable
                                                                                                                                                                                                                                                      • String ID: :
                                                                                                                                                                                                                                                      • API String ID: 2281059536-336475711
                                                                                                                                                                                                                                                      • Opcode ID: 8754c3b1114c533f0c2d74ef6a626152b899a1c72e305dee7d0670597648467f
                                                                                                                                                                                                                                                      • Instruction ID: f88271b30d0f04794893f8ab40fe0dd0539eee48a0dedee8aa5db7ba1dab94e6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8754c3b1114c533f0c2d74ef6a626152b899a1c72e305dee7d0670597648467f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 63416266A0C781A5EBB1BB61A4502BEF7A4FF84790FC80135EA8D537D5DF2CE441A720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                                      • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                                      • Opcode ID: f066f9fa8e2b64056c5816ad047118f8bc3c3deb3e3e559271ce8fa1bff5f537
                                                                                                                                                                                                                                                      • Instruction ID: 916b261a4142f384d8f745b8b97d999e172f1b13b827bd2fcdec9c191df053fa
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f066f9fa8e2b64056c5816ad047118f8bc3c3deb3e3e559271ce8fa1bff5f537
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 29F0FC65718B0291FB706B10E454339D360BF497A2FD44235CD6D552F4CF2DD404D320
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF733C6205D
                                                                                                                                                                                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF733C61D52,?,?,?,00007FF733C606DB), ref: 00007FF733C6207C
                                                                                                                                                                                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF733C61D52,?,?,?,00007FF733C606DB), ref: 00007FF733C6209E
                                                                                                                                                                                                                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF733C61D52,?,?,?,00007FF733C606DB), ref: 00007FF733C620DF
                                                                                                                                                                                                                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF733C61D52,?,?,?,00007FF733C606DB), ref: 00007FF733C620F7
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 66001078-0
                                                                                                                                                                                                                                                      • Opcode ID: 9f859319b3b72455038857b3948c16ccaf1e950f12b3988ac996b3ef0a449c94
                                                                                                                                                                                                                                                      • Instruction ID: f76c5f334ea9bb5fd330f7379f8bdbce8144ea9a895a50b19ab81be293992bba
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9f859319b3b72455038857b3948c16ccaf1e950f12b3988ac996b3ef0a449c94
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 39414E32A0CA42E6EBB4AF10D440279B360FB04745F984031DB4E626D4DF3EED91EB11
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FlsGetValue.KERNEL32(?,?,?,00007FF733C67E37,?,?,00000000,00007FF733C680D2,?,?,?,?,?,00007FF733C6805E), ref: 00007FF733C6D6D3
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF733C67E37,?,?,00000000,00007FF733C680D2,?,?,?,?,?,00007FF733C6805E), ref: 00007FF733C6D6F2
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF733C67E37,?,?,00000000,00007FF733C680D2,?,?,?,?,?,00007FF733C6805E), ref: 00007FF733C6D71A
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF733C67E37,?,?,00000000,00007FF733C680D2,?,?,?,?,?,00007FF733C6805E), ref: 00007FF733C6D72B
                                                                                                                                                                                                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF733C67E37,?,?,00000000,00007FF733C680D2,?,?,?,?,?,00007FF733C6805E), ref: 00007FF733C6D73C
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Value
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3702945584-0
                                                                                                                                                                                                                                                      • Opcode ID: a8c6d510351c4b95d6c9f76d28b47f3ce8af301c86c632fa5a1562bfd9ad1745
                                                                                                                                                                                                                                                      • Instruction ID: bb3508b4f6cb68f329c478b2f9f1cd47223754a4d3edac955fd513166d7f8da2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a8c6d510351c4b95d6c9f76d28b47f3ce8af301c86c632fa5a1562bfd9ad1745
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F7117F20A0C24322FAF87721A565179D1925F443F0EDC5735E83E366DADE2DF842A321
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Value
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3702945584-0
                                                                                                                                                                                                                                                      • Opcode ID: 929bfb46468997a7cce17995744891d6091495042dc8cc61d415b9c1b0c17444
                                                                                                                                                                                                                                                      • Instruction ID: 51a9e2b027e3baa8b1be80d1d53f3a7a87758a7f7f0c3352cc21d962232491d6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 929bfb46468997a7cce17995744891d6091495042dc8cc61d415b9c1b0c17444
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4D111C50A0C20722F9F8B7615475079D1915F48374E9C1739E93E7AAD2DE2DB842B730
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF733C62203
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                                                                                                                                                                                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                                      • API String ID: 3511171328-631824599
                                                                                                                                                                                                                                                      • Opcode ID: 1ec5bcb918012ac8b7319f3a40652a31004f18662585170a9d419b9ae026aae0
                                                                                                                                                                                                                                                      • Instruction ID: 3d651dd9aea4afbe4d7b7c4194182b543b30e465d56ed2921bb226edc6da1438
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1ec5bcb918012ac8b7319f3a40652a31004f18662585170a9d419b9ae026aae0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 10114F32A14B42A6F7A4AB22D554379B3A4FF44355F844135CA4D52A90EF3DF474D720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2718003287-0
                                                                                                                                                                                                                                                      • Opcode ID: 1309bd19cc395fbbde763f73ab8c973ae47e3b2fc9efad1be869f737f2af7d77
                                                                                                                                                                                                                                                      • Instruction ID: 6163cfa6e3d792b499a6cf6e66549d8a25ea880826838968505238088de684e1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1309bd19cc395fbbde763f73ab8c973ae47e3b2fc9efad1be869f737f2af7d77
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F2D12332B08A809DE7A1DF65D4402ECB7B5FB44B98B944236CE9DA7BC9DE38D446D310
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF733C74B03,00000000), ref: 00007FF733C74C34
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF733C74B03,00000000), ref: 00007FF733C74CBF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ConsoleErrorLastMode
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 953036326-0
                                                                                                                                                                                                                                                      • Opcode ID: c14f2174c2104d8536fdc1901a268c98a6676dd90a2cb401af9a2391e52543d3
                                                                                                                                                                                                                                                      • Instruction ID: ad7144872374dd3b3ee753abf516ec54fb42936a4990ad0a1f9dbce94bff70ac
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c14f2174c2104d8536fdc1901a268c98a6676dd90a2cb401af9a2391e52543d3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5E91D422B18651A9F7B0AF6594402FDBBA4BB00B8AF944139DE8E776D4CF3CD481D720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharErrorLastMultiWide
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 203985260-0
                                                                                                                                                                                                                                                      • Opcode ID: 9341f2710dc757ff7bc42cdcd365ac290861a622a879979225c5c00edac8c97f
                                                                                                                                                                                                                                                      • Instruction ID: eca7766a665a49990a7b6bbb2de3259e1744351f50bf100ceed25bf5e4e0104e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9341f2710dc757ff7bc42cdcd365ac290861a622a879979225c5c00edac8c97f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B2215176A18B81D7E7609F21E44432EBAB4F798B95F580134DB8D67B94DF3DD4018B10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2933794660-0
                                                                                                                                                                                                                                                      • Opcode ID: 0752faed2c64be0a210216895c40d031dbf65d8aa9a7dec5ed73cd956d765bd3
                                                                                                                                                                                                                                                      • Instruction ID: 6406530dd1e7b5d322cdf60a325b1c5fd19b7abf35378ccdb25cb0375fac5bde
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0752faed2c64be0a210216895c40d031dbf65d8aa9a7dec5ed73cd956d765bd3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F3115A26B14F019AEB50EF60E8452B873A4FB18759F840E31DE2E967A4DF3CE1949350
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorFileHandleInformationLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 275135790-0
                                                                                                                                                                                                                                                      • Opcode ID: 9fc74a38eef838ed1cb2bb3887b33f508be7068b0bd23077a422192673dc1a33
                                                                                                                                                                                                                                                      • Instruction ID: 9753ab65ba2f8dc32530c12f3f1cf976d5dbf3248291cc56180a81acde3626d6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9fc74a38eef838ed1cb2bb3887b33f508be7068b0bd23077a422192673dc1a33
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D4F0D671E1814296FBF4BB30E4646B4EA90AF50706F980130CA4F617E4DE2DE5849720
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: EncodePointer
                                                                                                                                                                                                                                                      • String ID: MOC$RCC
                                                                                                                                                                                                                                                      • API String ID: 2118026453-2084237596
                                                                                                                                                                                                                                                      • Opcode ID: 6c8a1ad9b2dd14a38ce59a9140fae546aa99af9281cbd4c5f54eb279d56b435b
                                                                                                                                                                                                                                                      • Instruction ID: a3ac5106b6705585b374b084e7b30e598fd9d003def7a5aa609a1ed68f276e16
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6c8a1ad9b2dd14a38ce59a9140fae546aa99af9281cbd4c5f54eb279d56b435b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2491B273A087819AE7A0EB64E8402ADB7B0FB44788F584139EB4D27796DF3CD195D700
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: EncodePointer
                                                                                                                                                                                                                                                      • String ID: MOC$RCC
                                                                                                                                                                                                                                                      • API String ID: 2118026453-2084237596
                                                                                                                                                                                                                                                      • Opcode ID: 85138a45848b6e99d9d24c06b214a49be9e617f3098cb972f5730af7df222da7
                                                                                                                                                                                                                                                      • Instruction ID: 4e4e2ebd8fa0fce1c7ac3b62c0e215590f564704b9cddfedc63225bb3e466578
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 85138a45848b6e99d9d24c06b214a49be9e617f3098cb972f5730af7df222da7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A861A132908BC595D7B0AF15E4403AAF7A0FB89784F584225EB9D23B96DF3CE194CB10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorFileLastWrite
                                                                                                                                                                                                                                                      • String ID: U
                                                                                                                                                                                                                                                      • API String ID: 442123175-4171548499
                                                                                                                                                                                                                                                      • Opcode ID: 79398ed7aff2c6f21d9f14bd257babe685f64ab3a633a3e710b27d0545059d7f
                                                                                                                                                                                                                                                      • Instruction ID: 109c1b99f0de38d7e402e8775987d1c753178d3360516d05c7028ba5beca8b2e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 79398ed7aff2c6f21d9f14bd257babe685f64ab3a633a3e710b27d0545059d7f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7241C322B1CA8195DBB0EF25E8443A9A7A5FB88784F844131EE8D97BD8DF3CD541D710
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF733C5BDAF), ref: 00007FF733C634B8
                                                                                                                                                                                                                                                      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF733C5BDAF), ref: 00007FF733C634F9
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000009.00000002.6501127777.00007FF733C51000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF733C50000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6500869448.00007FF733C50000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501341324.00007FF733C7A000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501498423.00007FF733C8A000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C8D000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000009.00000002.6501583956.00007FF733C93000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ff733c50000_Watchdog.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExceptionFileHeaderRaise
                                                                                                                                                                                                                                                      • String ID: csm
                                                                                                                                                                                                                                                      • API String ID: 2573137834-1018135373
                                                                                                                                                                                                                                                      • Opcode ID: 5b7f0b454f80348c103df898bd0041737ab7f2dca4b57be5a72f76fce5fb0a09
                                                                                                                                                                                                                                                      • Instruction ID: 8faaf94643f615e812e6a00202f1bd6421f5e77531427c374c98652d57ea21c0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5b7f0b454f80348c103df898bd0041737ab7f2dca4b57be5a72f76fce5fb0a09
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0D116036618B4092EB629F15F440269FBE4FB88B94F584230EE8D177A8DF3DD551C700