Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
740d3a.msi

Overview

General Information

Sample name:740d3a.msi
Analysis ID:1559267
MD5:64a6cf00b80fe77c16f6da137dd7a9d1
SHA1:f9365c7876ac8934a48237499cf8774fe78ea196
SHA256:630acefe136ea2e4bb95211a214e4829d8cb59d4d948b09221e61acd278854bf
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Suricata IDS alerts for network traffic
.NET source code contains method to dynamically call methods (often used by packers)
Creates autostart registry keys with suspicious names
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to harvest and steal Bitcoin Wallet information
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
AV process strings found (often used to terminate AV products)
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: PowerShell Script Run in AppData
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • msiexec.exe (PID: 8108 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\740d3a.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 8408 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • SrTasks.exe (PID: 7812 cmdline: C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:8 MD5: 2694D2D28C368B921686FE567BD319EB)
      • conhost.exe (PID: 8028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • msiexec.exe (PID: 5780 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 5A82BF8611EA627E788B63841849825E MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • aipackagechainer.exe (PID: 7804 cmdline: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe" MD5: 2C0130F614EA8C240320EC47D0008EEA)
      • Vista Software.exe (PID: 2660 cmdline: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" MD5: 35135E7F357C522D07DDD87307C0345C)
        • Vista Software.tmp (PID: 3200 cmdline: "C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmp" /SL5="$40454,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" MD5: 584586C0CF548DB94F76F124046D58D9)
          • Vista Software.exe (PID: 1744 cmdline: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT MD5: 35135E7F357C522D07DDD87307C0345C)
            • Vista Software.tmp (PID: 1284 cmdline: "C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp" /SL5="$50454,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT MD5: 584586C0CF548DB94F76F124046D58D9)
              • cmd.exe (PID: 4656 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 3464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
                • tasklist.exe (PID: 9248 cmdline: tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 9260 cmdline: find /I "wrsa.exe" MD5: AE3F3DC3ED900F2A582BAD86A764508C)
              • cmd.exe (PID: 9308 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 9316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
                • tasklist.exe (PID: 9368 cmdline: tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 9376 cmdline: find /I "opssvc.exe" MD5: AE3F3DC3ED900F2A582BAD86A764508C)
              • cmd.exe (PID: 9420 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 9428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
                • tasklist.exe (PID: 9480 cmdline: tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 9488 cmdline: find /I "avastui.exe" MD5: AE3F3DC3ED900F2A582BAD86A764508C)
              • cmd.exe (PID: 9528 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 9536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
                • tasklist.exe (PID: 9584 cmdline: tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 9592 cmdline: find /I "avgui.exe" MD5: AE3F3DC3ED900F2A582BAD86A764508C)
              • cmd.exe (PID: 9632 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 9640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
                • tasklist.exe (PID: 9692 cmdline: tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 9700 cmdline: find /I "nswscsvc.exe" MD5: AE3F3DC3ED900F2A582BAD86A764508C)
              • cmd.exe (PID: 9740 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 9748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
                • tasklist.exe (PID: 9800 cmdline: tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 9808 cmdline: find /I "sophoshealth.exe" MD5: AE3F3DC3ED900F2A582BAD86A764508C)
              • file.exe (PID: 9852 cmdline: "C:\Users\user\AppData\Local\clithe\\file.exe" "C:\Users\user\AppData\Local\clithe\\millhouse1.a3x" MD5: 3F58A517F1F4796225137E7659AD2ADB)
                • cmd.exe (PID: 9536 cmdline: "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\kwZvl2ZDr.a3x && del C:\ProgramData\\kwZvl2ZDr.a3x MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                  • conhost.exe (PID: 9648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
                  • PING.EXE (PID: 9704 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
                  • file.exe (PID: 9668 cmdline: file.exe C:\ProgramData\\kwZvl2ZDr.a3x MD5: 3F58A517F1F4796225137E7659AD2ADB)
                    • MSBuild.exe (PID: 9840 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • powershell.exe (PID: 824 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 4504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
        • powershell.exe (PID: 8876 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 8840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
        • powershell.exe (PID: 6352 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 8104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
        • AutoIt3.exe (PID: 8876 cmdline: "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x MD5: 3F58A517F1F4796225137E7659AD2ADB)
          • MSBuild.exe (PID: 2140 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • svchost.exe (PID: 9932 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: F586835082F632DC8D9404D83BC16316)
  • AutoIt3.exe (PID: 5780 cmdline: "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x MD5: 3F58A517F1F4796225137E7659AD2ADB)
    • MSBuild.exe (PID: 9256 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000003A.00000002.1895490189.0000000002FD1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000038.00000002.2180979684.0000000003061000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe", ParentImage: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe, ParentProcessId: 7804, ParentProcessName: aipackagechainer.exe, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", ProcessId: 824, ProcessName: powershell.exe
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\clithe\file.exe, ProcessId: 9668, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eeacadf
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community: Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe", ParentImage: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe, ParentProcessId: 7804, ParentProcessName: aipackagechainer.exe, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", ProcessId: 824, ProcessName: powershell.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe", ParentImage: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe, ParentProcessId: 7804, ParentProcessName: aipackagechainer.exe, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", ProcessId: 824, ProcessName: powershell.exe
      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 888, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 9932, ProcessName: svchost.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-20T11:34:52.363431+010020355951Domain Observed Used for C2 Detected167.114.47.18656001192.168.11.2049711TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeReversingLabs: Detection: 21%
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\reclosable_is1Jump to behavior
      Source: unknownHTTPS traffic detected: 23.44.201.15:443 -> 192.168.11.20:49701 version: TLS 1.2
      Source: Binary string: winload_prod.pdbx source: SrTasks.exe, 00000005.00000002.1135332325.00000140CB49A000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\aipackagechainer.pdb source: aipackagechainer.exe, 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmp, aipackagechainer.exe, 00000008.00000000.1025564632.00000000002E7000.00000002.00000001.01000000.00000005.sdmp
      Source: Binary string: winload_prod.pdb^yn# source: SrTasks.exe, 00000005.00000003.1105177448.00000140C99E0000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: ntkrnlmp.pdbic source: SrTasks.exe, 00000005.00000003.1124144652.00000140C8A3F000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: ntkrnlmp.pdb source: SrTasks.exe, 00000005.00000002.1135046185.00000140CB442000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: WINLOA~1.PDB1 source: SrTasks.exe, 00000005.00000002.1135332325.00000140CB49A000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: WINLOA~1.PDB source: SrTasks.exe, 00000005.00000003.1105177448.00000140C99E0000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: ntkrnlmp.pdbrjF source: SrTasks.exe, 00000005.00000003.1104903628.00000140C98E0000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: WINLOA~1.PDBb source: SrTasks.exe, 00000005.00000003.1124144652.00000140C8A3F000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: winload_prod.pdbrs\*\AppData\Local:` source: SrTasks.exe, 00000005.00000003.1124144652.00000140C8A3F000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: d:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
      Source: C:\Windows\System32\svchost.exeFile opened: c:
      Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00274320 FindFirstFileW,FindClose,FindClose,8_2_00274320
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00266BA0 FindFirstFileW,GetLastError,FindClose,8_2_00266BA0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0025B5A0 FindFirstFileW,CreateFileW,SetFilePointer,ReadFile,CloseHandle,GetModuleFileNameW,SetCurrentDirectoryW,OpenMutexW,GetLastError,WaitForSingleObject,CloseHandle,CloseHandle,FindClose,8_2_0025B5A0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0025DD10 DeleteFileW,FindFirstFileW,FindNextFileW,FindClose,PathIsDirectoryW,8_2_0025DD10
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0028AC60 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,8_2_0028AC60
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002CCCF0 FindFirstFileExW,8_2_002CCCF0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00280E10 FindFirstFileW,FindClose,8_2_00280E10
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00289440 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,8_2_00289440
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00289880 FindFirstFileW,FindClose,8_2_00289880
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00241950 FindFirstFileW,FindNextFileW,FindClose,8_2_00241950
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00263B60 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,8_2_00263B60
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00267DF0 FindFirstFileW,FindClose,8_2_00267DF0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FEC0D2 FindFirstFileExW,55_2_00FEC0D2
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101E180 GetFileAttributesW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,55_2_0101E180
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102A187 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,55_2_0102A187
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102A2E4 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,55_2_0102A2E4
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102A66E FindFirstFileW,Sleep,FindNextFileW,FindClose,55_2_0102A66E
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101E9BA GetFileAttributesW,FindFirstFileW,FindClose,55_2_0101E9BA
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102686D FindFirstFileW,FindNextFileW,FindClose,55_2_0102686D
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01027591 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,55_2_01027591
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_010274F0 FindFirstFileW,FindClose,55_2_010274F0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101DE32 GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,55_2_0101DE32
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012426B5 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,55_2_012426B5
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012427BD FindFirstFileA,GetLastError,55_2_012427BD
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0123FFE5 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,55_2_0123FFE5
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0060C0D2 FindFirstFileExW,57_2_0060C0D2
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0063E180 GetFileAttributesW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,57_2_0063E180
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0064A187 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,57_2_0064A187
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0064A2E4 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,57_2_0064A2E4
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0064A66E FindFirstFileW,Sleep,FindNextFileW,FindClose,57_2_0064A66E
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0064686D FindFirstFileW,FindNextFileW,FindClose,57_2_0064686D
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0063E9BA GetFileAttributesW,FindFirstFileW,FindClose,57_2_0063E9BA
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_006474F0 FindFirstFileW,FindClose,57_2_006474F0
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_00647591 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,57_2_00647591
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0063DE32 GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,57_2_0063DE32
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0169C7ED FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,57_2_0169C7ED
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0169A11D GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,57_2_0169A11D
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0169C8F5 FindFirstFileA,GetLastError,57_2_0169C8F5
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002880E0 GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,8_2_002880E0

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 167.114.47.186:56001 -> 192.168.11.20:49711
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
      Source: global trafficTCP traffic: 192.168.11.20:49711 -> 167.114.47.186:56001
      Source: Joe Sandbox ViewIP Address: 167.114.47.186 167.114.47.186
      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
      Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
      Source: unknownTCP traffic detected without corresponding DNS query: 69.164.46.128
      Source: unknownTCP traffic detected without corresponding DNS query: 69.164.46.128
      Source: unknownTCP traffic detected without corresponding DNS query: 69.164.46.128
      Source: unknownTCP traffic detected without corresponding DNS query: 69.164.46.128
      Source: unknownTCP traffic detected without corresponding DNS query: 69.164.46.128
      Source: unknownTCP traffic detected without corresponding DNS query: 69.164.46.128
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.18
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.18
      Source: unknownTCP traffic detected without corresponding DNS query: 40.126.24.84
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 40.126.24.84
      Source: unknownTCP traffic detected without corresponding DNS query: 40.126.24.84
      Source: unknownTCP traffic detected without corresponding DNS query: 40.126.24.84
      Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
      Source: unknownTCP traffic detected without corresponding DNS query: 104.18.20.226
      Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
      Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
      Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
      Source: unknownTCP traffic detected without corresponding DNS query: 104.18.20.226
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.17
      Source: unknownTCP traffic detected without corresponding DNS query: 23.44.201.17
      Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
      Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
      Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
      Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
      Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
      Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102D935 InternetReadFile,SetEvent,GetLastError,SetEvent,55_2_0102D935
      Source: global trafficHTTP traffic detected: GET /r/r1.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
      Source: global trafficDNS traffic detected: DNS query: c.pki.goog
      Source: powershell.exe, 0000000D.00000002.1070262048.0000000002EE6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1065615160.0000000002FB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
      Source: powershell.exe, 0000000D.00000002.1070262048.0000000002EE6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1065615160.0000000002FB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
      Source: powershell.exe, 0000000D.00000002.1111749554.0000000007370000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
      Source: powershell.exe, 0000000D.00000002.1111749554.0000000007328000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab6
      Source: powershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr306
      Source: powershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png4
      Source: powershell.exe, 0000000D.00000002.1072733679.0000000004C31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
      Source: powershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html4
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/X
      Source: powershell.exe, 0000000D.00000002.1123205050.0000000008814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
      Source: powershell.exe, 0000000D.00000002.1070262048.0000000002EE6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1123205050.00000000087F8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1065615160.0000000002FB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
      Source: powershell.exe, 0000000D.00000002.1072733679.0000000004C31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
      Source: powershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: powershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester4
      Source: Vista Software.exe, 00000009.00000000.1030398261.0000000000A21000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
      Source: powershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: powershell.exe, 0000000D.00000002.1070262048.0000000002EE6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1123205050.00000000087F8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1065615160.0000000002FB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/autoit3/
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/06
      Source: Vista Software.exe, 00000009.00000003.1032807752.000000000366F000.00000004.00001000.00020000.00000000.sdmp, Vista Software.exe, 00000009.00000003.1034717219.000000007F77B000.00000004.00001000.00020000.00000000.sdmp, Vista Software.tmp, 0000000A.00000000.1038233720.0000000000841000.00000020.00000001.01000000.00000009.sdmp, Vista Software.tmp, 0000000C.00000000.1048572672.0000000000B9D000.00000020.00000001.01000000.0000000A.sdmpString found in binary or memory: https://www.innosetup.com/
      Source: Vista Software.exe, 00000009.00000003.1032807752.000000000366F000.00000004.00001000.00020000.00000000.sdmp, Vista Software.exe, 00000009.00000003.1034717219.000000007F77B000.00000004.00001000.00020000.00000000.sdmp, Vista Software.tmp, 0000000A.00000000.1038233720.0000000000841000.00000020.00000001.01000000.00000009.sdmp, Vista Software.tmp, 0000000C.00000000.1048572672.0000000000B9D000.00000020.00000001.01000000.0000000A.sdmpString found in binary or memory: https://www.remobjects.com/ps
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49678
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
      Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
      Source: unknownHTTPS traffic detected: 23.44.201.15:443 -> 192.168.11.20:49701 version: TLS 1.2
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102F664 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,55_2_0102F664
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102F8D3 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,55_2_0102F8D3
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0064F8D3 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,57_2_0064F8D3
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102F664 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,55_2_0102F664
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FC4B74 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,55_2_00FC4B74
      Source: SrTasks.exe, 00000005.00000003.1104646781.00000140C97E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: #_WinAPI_RegisterRawInputDevices.au3memstr_07419e5d-2
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01049FB4 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,55_2_01049FB4
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_00669FB4 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,57_2_00669FB4
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012543B1 CreateDesktopA,CreateProcessA,CreateProcessA,CreateProcessA,CreateProcessA,WaitForSingleObject,55_2_012543B1
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01257839 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,55_2_01257839
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_016B1971 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,57_2_016B1971
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101E3CB: CreateFileW,DeviceIoControl,CloseHandle,55_2_0101E3CB
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101230F LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,55_2_0101230F
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0024C3A0 GetForegroundWindow,MessageBoxW,GetCurrentProcess,OpenProcessToken,CloseHandle,GetLastError,ExitWindowsEx,CloseHandle,8_2_0024C3A0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101F76E ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,55_2_0101F76E
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0063F76E ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,57_2_0063F76E
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\549e0c.msiJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA1F4.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2A1.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA30F.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA38D.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA44A.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA499.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA546.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\549e0f.msiJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\549e0f.msiJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA70C.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA893.tmpJump to behavior
      Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
      Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIA1F4.tmpJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0024AB008_2_0024AB00
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0027FF108_2_0027FF10
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002AE0908_2_002AE090
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002BA0D08_2_002BA0D0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002A81008_2_002A8100
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002415F08_2_002415F0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002AA4108_2_002AA410
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002AA4B08_2_002AA4B0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002AE4908_2_002AE490
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0024E5408_2_0024E540
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002725408_2_00272540
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002AC5C08_2_002AC5C0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002AE6408_2_002AE640
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002AC6E08_2_002AC6E0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0024E8708_2_0024E870
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002529408_2_00252940
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002A4A508_2_002A4A50
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0024EAA08_2_0024EAA0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002D0D6D8_2_002D0D6D
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B4E008_2_002B4E00
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002C8E608_2_002C8E60
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002990508_2_00299050
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002A31908_2_002A3190
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002C91C08_2_002C91C0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0026F2708_2_0026F270
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002AF4008_2_002AF400
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0029D6F08_2_0029D6F0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002459308_2_00245930
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002ADA308_2_002ADA30
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002BDACC8_2_002BDACC
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00297CA08_2_00297CA0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0029FD208_2_0029FD20
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0026DDB08_2_0026DDB0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0026DEC08_2_0026DEC0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002BDF0B8_2_002BDF0B
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FB707055_2_00FB7070
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FC3AD955_2_00FC3AD9
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FEE32F55_2_00FEE32F
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD24CA55_2_00FD24CA
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FE659955_2_00FE6599
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD29E355_2_00FD29E3
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FDC9C055_2_00FDC9C0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0103C84455_2_0103C844
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FCCBF055_2_00FCCBF0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01022D8155_2_01022D81
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FE6C0955_2_00FE6C09
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FBCE2055_2_00FBCE20
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FBEE0055_2_00FBEE00
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD2F2355_2_00FD2F23
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FCF0DA55_2_00FCF0DA
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101916855_2_01019168
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0104525A55_2_0104525A
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FCD37F55_2_00FCD37F
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD774655_2_00FD7746
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD797555_2_00FD7975
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD196455_2_00FD1964
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD7BD255_2_00FD7BD2
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FBDC7055_2_00FBDC70
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FE9D1E55_2_00FE9D1E
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD1FC155_2_00FD1FC1
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0125718A55_2_0125718A
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0125719155_2_01257191
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_02EA4AF856_2_02EA4AF8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_02EA4AD556_2_02EA4AD5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_02EA1DA856_2_02EA1DA8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_02EA1DB856_2_02EA1DB8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_06404C2056_2_06404C20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0640C22056_2_0640C220
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0640DF6856_2_0640DF68
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0640372856_2_06403728
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_06404C1156_2_06404C11
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0640C21156_2_0640C211
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0640A2F056_2_0640A2F0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0640A30056_2_0640A300
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0640884356_2_06408843
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0640885056_2_06408850
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0640B90356_2_0640B903
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0642573056_2_06425730
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0642342056_2_06423420
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0642573956_2_06425739
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0642341056_2_06423410
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_06422D4556_2_06422D45
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_064252DD56_2_064252DD
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_0642580556_2_06425805
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_064251DE56_2_064251DE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 56_2_064251E756_2_064251E7
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005D707057_2_005D7070
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005E3AD957_2_005E3AD9
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0060E32F57_2_0060E32F
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F24CA57_2_005F24CA
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0060659957_2_00606599
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0065C84457_2_0065C844
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005FC9C057_2_005FC9C0
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F29E357_2_005F29E3
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005ECBF057_2_005ECBF0
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_00606C0957_2_00606C09
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_00642D8157_2_00642D81
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005DEE0057_2_005DEE00
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005DCE2057_2_005DCE20
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F2F2357_2_005F2F23
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005EF0DA57_2_005EF0DA
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0063916857_2_00639168
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0066525A57_2_0066525A
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005ED37F57_2_005ED37F
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F774657_2_005F7746
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F797557_2_005F7975
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F196457_2_005F1964
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F7BD257_2_005F7BD2
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005DDC7057_2_005DDC70
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_00609D1E57_2_00609D1E
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F1FC157_2_005F1FC1
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_016B12C957_2_016B12C9
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_016B12C257_2_016B12C2
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: String function: 002B5540 appears 55 times
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: String function: 00245680 appears 66 times
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: String function: 00245350 appears 67 times
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: String function: 002439B0 appears 49 times
      Source: C:\dbgbkfc\AutoIt3.exeCode function: String function: 005DFA3B appears 33 times
      Source: C:\dbgbkfc\AutoIt3.exeCode function: String function: 005F488E appears 33 times
      Source: C:\dbgbkfc\AutoIt3.exeCode function: String function: 005F014F appears 40 times
      Source: C:\dbgbkfc\AutoIt3.exeCode function: String function: 005F1000 appears 41 times
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: String function: 00FD1000 appears 41 times
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: String function: 00FD014F appears 40 times
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: String function: 00FD488E appears 33 times
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: String function: 00FBFA3B appears 33 times
      Source: Vista Software.tmp.9.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
      Source: Vista Software.tmp.11.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
      Source: is-T9NMH.tmp.12.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
      Source: Vista Software.tmp.9.drStatic PE information: Number of sections : 11 > 10
      Source: Vista Software.tmp.11.drStatic PE information: Number of sections : 11 > 10
      Source: is-T9NMH.tmp.12.drStatic PE information: Number of sections : 11 > 10
      Source: Vista Software.exe.7.drStatic PE information: Number of sections : 11 > 10
      Source: 55.2.file.exe.3ee2f24.1.raw.unpack, IdentifierAuthenticationMapper.csCryptographic APIs: 'CreateDecryptor'
      Source: 55.2.file.exe.3ee2f24.1.raw.unpack, TokenValListener.csCryptographic APIs: 'CreateDecryptor'
      Source: 55.2.file.exe.3ee2f24.1.raw.unpack, TokenValListener.csCryptographic APIs: 'CreateDecryptor'
      Source: 57.2.AutoIt3.exe.4772f24.1.raw.unpack, IdentifierAuthenticationMapper.csCryptographic APIs: 'CreateDecryptor'
      Source: 57.2.AutoIt3.exe.4772f24.1.raw.unpack, TokenValListener.csCryptographic APIs: 'CreateDecryptor'
      Source: 57.2.AutoIt3.exe.4772f24.1.raw.unpack, TokenValListener.csCryptographic APIs: 'CreateDecryptor'
      Source: SrTasks.exe, 00000005.00000002.1134260436.00000140CB2A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AutoItX.sln
      Source: SrTasks.exe, 00000005.00000003.1104646781.00000140C97E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AutoItX.sln~<<
      Source: classification engineClassification label: mal96.troj.spyw.evad.winMSI@86/67@1/2
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00269710 FormatMessageW,GetLastError,8_2_00269710
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_010121C9 AdjustTokenPrivileges,CloseHandle,55_2_010121C9
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_010127D9 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,55_2_010127D9
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_006321C9 AdjustTokenPrivileges,CloseHandle,57_2_006321C9
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_006327D9 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,57_2_006327D9
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0028A8A0 GetDiskFreeSpaceExW,8_2_0028A8A0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101E2AB CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CompareStringW,CloseHandle,55_2_0101E2AB
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00294B00 CoCreateInstance,8_2_00294B00
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00262720 LoadLibraryExW,LoadLibraryExW,FindResourceW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,8_2_00262720
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\InstallerJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\fe5d05a685
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9648:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8840:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3464:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8104:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4504:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9428:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8104:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8840:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9640:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9648:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9316:120:WilError_03
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9536:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4504:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3464:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9316:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9748:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9536:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9748:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:8028:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:8028:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9428:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9640:120:WilError_03
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF766EBEFD2708DDD6.TMPJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\clithe\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
      Source: C:\dbgbkfc\AutoIt3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
      Source: C:\dbgbkfc\AutoIt3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
      Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;WRSA.EXE&apos;
      Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;OPSSVC.EXE&apos;
      Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;AVASTUI.EXE&apos;
      Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;AVGUI.EXE&apos;
      Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;NSWSCSVC.EXE&apos;
      Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;SOPHOSHEALTH.EXE&apos;
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeFile read: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.iniJump to behavior
      Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
      Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\740d3a.msi"
      Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\SrTasks.exe C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:8
      Source: C:\Windows\System32\SrTasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5A82BF8611EA627E788B63841849825E
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe"
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe"
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmp "C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmp" /SL5="$40454,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp "C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp" /SL5="$50454,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10"
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "wrsa.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "opssvc.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avastui.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avgui.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "nswscsvc.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "sophoshealth.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Local\clithe\file.exe "C:\Users\user\AppData\Local\clithe\\file.exe" "C:\Users\user\AppData\Local\clithe\\millhouse1.a3x"
      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\kwZvl2ZDr.a3x && del C:\ProgramData\\kwZvl2ZDr.a3x
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\clithe\file.exe file.exe C:\ProgramData\\kwZvl2ZDr.a3x
      Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\dbgbkfc\AutoIt3.exe "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
      Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      Source: unknownProcess created: C:\dbgbkfc\AutoIt3.exe "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
      Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\SrTasks.exe C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:8Jump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5A82BF8611EA627E788B63841849825EJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe"Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10"Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmp "C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmp" /SL5="$40454,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENTJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp "C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp" /SL5="$50454,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENTJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Local\clithe\file.exe "C:\Users\user\AppData\Local\clithe\\file.exe" "C:\Users\user\AppData\Local\clithe\\millhouse1.a3x"Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "wrsa.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "opssvc.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avastui.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avgui.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "nswscsvc.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "sophoshealth.exe"
      Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\kwZvl2ZDr.a3x && del C:\ProgramData\\kwZvl2ZDr.a3x
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\clithe\file.exe file.exe C:\ProgramData\\kwZvl2ZDr.a3x
      Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: dsrole.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msxml3.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: vss_ps.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: es.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: samlib.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: spp.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: srclient.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: srcore.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: vssapi.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: vsstrace.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: ktmw32.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: wer.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: bcd.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: dsrole.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: msxml3.dllJump to behavior
      Source: C:\Windows\System32\SrTasks.exeSection loaded: vss_ps.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: atlthunk.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: explorerframe.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: winsta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: winsta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: explorerframe.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: sfc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: sfc_os.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: edgegdi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
      Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: edgegdi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
      Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: edgegdi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
      Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: edgegdi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
      Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: edgegdi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
      Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: edgegdi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
      Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wsock32.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: version.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: winmm.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: mpr.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wininet.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: iphlpapi.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: userenv.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: uxtheme.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: edgegdi.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: kernel.appcore.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: cryptsp.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: rsaenh.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: cryptbase.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: windows.storage.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wldp.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: profapi.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: propsys.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: edputil.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: urlmon.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: iertutil.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: srvcli.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: netutils.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: windows.staterepositoryps.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: sspicli.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wintypes.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: appresolver.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: bcp47langs.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: slc.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: sppc.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: onecorecommonproxystub.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: onecoreuapcommonproxystub.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: pcacli.dll
      Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: sfc_os.dll
      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\svchost.exeSection loaded: edgegdi.dll
      Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
      Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\SrTasks.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{883FF1FC-09E1-48e5-8E54-E2469ACB0CFD}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
      Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.iniJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpWindow found: window name: TMainFormJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\reclosable_is1Jump to behavior
      Source: 740d3a.msiStatic file information: File size 6722560 > 1048576
      Source: Binary string: winload_prod.pdbx source: SrTasks.exe, 00000005.00000002.1135332325.00000140CB49A000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\aipackagechainer.pdb source: aipackagechainer.exe, 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmp, aipackagechainer.exe, 00000008.00000000.1025564632.00000000002E7000.00000002.00000001.01000000.00000005.sdmp
      Source: Binary string: winload_prod.pdb^yn# source: SrTasks.exe, 00000005.00000003.1105177448.00000140C99E0000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: ntkrnlmp.pdbic source: SrTasks.exe, 00000005.00000003.1124144652.00000140C8A3F000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: ntkrnlmp.pdb source: SrTasks.exe, 00000005.00000002.1135046185.00000140CB442000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: WINLOA~1.PDB1 source: SrTasks.exe, 00000005.00000002.1135332325.00000140CB49A000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: WINLOA~1.PDB source: SrTasks.exe, 00000005.00000003.1105177448.00000140C99E0000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: ntkrnlmp.pdbrjF source: SrTasks.exe, 00000005.00000003.1104903628.00000140C98E0000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: WINLOA~1.PDBb source: SrTasks.exe, 00000005.00000003.1124144652.00000140C8A3F000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: winload_prod.pdbrs\*\AppData\Local:` source: SrTasks.exe, 00000005.00000003.1124144652.00000140C8A3F000.00000004.00000020.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: 55.2.file.exe.3ee2f24.1.raw.unpack, TokenValListener.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
      Source: 57.2.AutoIt3.exe.4772f24.1.raw.unpack, TokenValListener.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002698C0 LoadLibraryW,GetProcAddress,GetSystemMetrics,GetSystemMetrics,LoadImageW,FreeLibrary,8_2_002698C0
      Source: Vista Software.tmp.9.drStatic PE information: real checksum: 0x0 should be: 0x37b358
      Source: Vista Software.tmp.11.drStatic PE information: real checksum: 0x0 should be: 0x37b358
      Source: is-T9NMH.tmp.12.drStatic PE information: real checksum: 0x0 should be: 0x3817ca
      Source: aipackagechainer.exe.7.drStatic PE information: real checksum: 0xe3b49 should be: 0xe4c7b
      Source: Vista Software.exe.7.drStatic PE information: real checksum: 0x85f640a should be: 0x33372a
      Source: MSIA499.tmp.1.drStatic PE information: section name: .didat
      Source: MSIA499.tmp.1.drStatic PE information: section name: .fptable
      Source: MSIA70C.tmp.1.drStatic PE information: section name: .didat
      Source: MSIA70C.tmp.1.drStatic PE information: section name: .fptable
      Source: MSIA1F4.tmp.1.drStatic PE information: section name: .fptable
      Source: MSIA2A1.tmp.1.drStatic PE information: section name: .fptable
      Source: MSIA30F.tmp.1.drStatic PE information: section name: .fptable
      Source: MSIA38D.tmp.1.drStatic PE information: section name: .fptable
      Source: MSIA44A.tmp.1.drStatic PE information: section name: .fptable
      Source: Vista Software.exe.7.drStatic PE information: section name: .didata
      Source: aipackagechainer.exe.7.drStatic PE information: section name: .didat
      Source: aipackagechainer.exe.7.drStatic PE information: section name: .fptable
      Source: Vista Software.tmp.9.drStatic PE information: section name: .didata
      Source: Vista Software.tmp.11.drStatic PE information: section name: .didata
      Source: is-T9NMH.tmp.12.drStatic PE information: section name: .didata
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B1054 push edi; ret 8_2_002B105F
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B512D push ecx; ret 8_2_002B5140
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_04776A5D push esp; ret 13_2_04776A83
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_04DB2E85 pushfd ; ret 15_2_04DB2E89
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_04DB3A4B push ebx; retf 15_2_04DB3AEA
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD1046 push ecx; ret 55_2_00FD1059
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01258186 push 0125820Dh; ret 55_2_01258205
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012581E1 push 0125820Dh; ret 55_2_01258205
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012541C7 push 01254246h; ret 55_2_0125423E
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012541C9 push 01254246h; ret 55_2_0125423E
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012581D9 push 0125820Dh; ret 55_2_01258205
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01256351 push 0125637Dh; ret 55_2_01256375
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01258219 push 0125823Fh; ret 55_2_01258237
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012525A5 push 012525D1h; ret 55_2_012525C9
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01256599 push 012565E5h; ret 55_2_012565DD
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01256945 push 01256988h; ret 55_2_01256980
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01256944 push 01256988h; ret 55_2_01256980
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012568ED push 01256921h; ret 55_2_01256919
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012568F5 push 01256921h; ret 55_2_01256919
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01240B55 push 01240BA6h; ret 55_2_01240B9E
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01242A79 push ecx; mov dword ptr [esp], eax55_2_01242A7A
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01256D75 push 01256DB8h; ret 55_2_01256DB0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01256D74 push 01256DB8h; ret 55_2_01256DB0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01240D9D push 01240DC9h; ret 55_2_01240DC1
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01240DD5 push 01240E01h; ret 55_2_01240DF9
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01250F0D push 01250FB8h; ret 55_2_01250FB0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01250F0B push 01250FB8h; ret 55_2_01250FB0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01250FBD push 0125104Dh; ret 55_2_01251045
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01254F8D push 01254FD9h; ret 55_2_01254FD1
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01254FE5 push 01255011h; ret 55_2_01255009
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01255135 push 01255161h; ret 55_2_01255159
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\Temp\is-ID1JF.tmp\_isetup\_setup64.tmpJump to dropped file
      Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA499.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2A1.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA44A.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\clithe\file.exeFile created: C:\dbgbkfc\AutoIt3.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\clithe\is-T9NMH.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\clithe\unins000.exe (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\clithe\file.exe (copy)Jump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA70C.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\Temp\is-QVJTJ.tmp\_isetup\_setup64.tmpJump to dropped file
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeFile created: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpJump to dropped file
      Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA38D.tmpJump to dropped file
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeFile created: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\clithe\is-IOH31.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA1F4.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA30F.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA499.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2A1.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA44A.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA70C.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA38D.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA1F4.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA30F.tmpJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
      Source: C:\Windows\System32\msiexec.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisherJump to behavior
      Source: C:\Windows\System32\msiexec.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestoreJump to behavior
      Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
      Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
      Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
      Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01042558 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,55_2_01042558
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FC5D03 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,55_2_00FC5D03
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_00662558 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,57_2_00662558
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005E5D03 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,57_2_005E5D03
      Source: C:\Windows\System32\msiexec.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 BlobJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\clithe\file.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\clithe\file.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\clithe\file.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\dbgbkfc\AutoIt3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\dbgbkfc\AutoIt3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2E60000 memory reserve | memory write watch
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 3030000 memory reserve | memory write watch
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 5030000 memory reserve | memory write watch
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2DE0000 memory reserve | memory write watch
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2F90000 memory reserve | memory write watch
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 4F90000 memory reserve | memory write watch
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2F60000 memory reserve | memory write watch
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 31F0000 memory reserve | memory write watch
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2FF0000 memory reserve | memory write watch
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9843Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9925
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9869
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 9922
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-ID1JF.tmp\_isetup\_setup64.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA499.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA44A.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA2A1.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\clithe\unins000.exe (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\clithe\is-T9NMH.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA70C.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-QVJTJ.tmp\_isetup\_setup64.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA38D.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA1F4.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA30F.tmpJump to dropped file
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_8-56329
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_8-56740
      Source: C:\Users\user\AppData\Local\clithe\file.exeAPI coverage: 5.6 %
      Source: C:\dbgbkfc\AutoIt3.exeAPI coverage: 5.5 %
      Source: C:\Windows\System32\SrTasks.exe TID: 3056Thread sleep time: -40000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3188Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3188Thread sleep time: -900000s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6636Thread sleep count: 9869 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 9256Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 9256Thread sleep time: -900000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 9996Thread sleep time: -30000s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2788Thread sleep time: -3689348814741908s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6740Thread sleep count: 9922 > 30
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2660Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1140Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00274320 FindFirstFileW,FindClose,FindClose,8_2_00274320
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00266BA0 FindFirstFileW,GetLastError,FindClose,8_2_00266BA0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0025B5A0 FindFirstFileW,CreateFileW,SetFilePointer,ReadFile,CloseHandle,GetModuleFileNameW,SetCurrentDirectoryW,OpenMutexW,GetLastError,WaitForSingleObject,CloseHandle,CloseHandle,FindClose,8_2_0025B5A0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0025DD10 DeleteFileW,FindFirstFileW,FindNextFileW,FindClose,PathIsDirectoryW,8_2_0025DD10
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0028AC60 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,8_2_0028AC60
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002CCCF0 FindFirstFileExW,8_2_002CCCF0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00280E10 FindFirstFileW,FindClose,8_2_00280E10
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00289440 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,8_2_00289440
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00289880 FindFirstFileW,FindClose,8_2_00289880
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00241950 FindFirstFileW,FindNextFileW,FindClose,8_2_00241950
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00263B60 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,8_2_00263B60
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00267DF0 FindFirstFileW,FindClose,8_2_00267DF0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FEC0D2 FindFirstFileExW,55_2_00FEC0D2
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101E180 GetFileAttributesW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,55_2_0101E180
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102A187 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,55_2_0102A187
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102A2E4 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,55_2_0102A2E4
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102A66E FindFirstFileW,Sleep,FindNextFileW,FindClose,55_2_0102A66E
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101E9BA GetFileAttributesW,FindFirstFileW,FindClose,55_2_0101E9BA
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102686D FindFirstFileW,FindNextFileW,FindClose,55_2_0102686D
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01027591 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,55_2_01027591
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_010274F0 FindFirstFileW,FindClose,55_2_010274F0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101DE32 GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,55_2_0101DE32
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012426B5 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,55_2_012426B5
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012427BD FindFirstFileA,GetLastError,55_2_012427BD
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0123FFE5 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,55_2_0123FFE5
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0060C0D2 FindFirstFileExW,57_2_0060C0D2
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0063E180 GetFileAttributesW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,57_2_0063E180
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0064A187 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,57_2_0064A187
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0064A2E4 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,57_2_0064A2E4
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0064A66E FindFirstFileW,Sleep,FindNextFileW,FindClose,57_2_0064A66E
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0064686D FindFirstFileW,FindNextFileW,FindClose,57_2_0064686D
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0063E9BA GetFileAttributesW,FindFirstFileW,FindClose,57_2_0063E9BA
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_006474F0 FindFirstFileW,FindClose,57_2_006474F0
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_00647591 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,57_2_00647591
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0063DE32 GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,57_2_0063DE32
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0169C7ED FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,57_2_0169C7ED
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0169A11D GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,57_2_0169A11D
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_0169C8F5 FindFirstFileA,GetLastError,57_2_0169C8F5
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002880E0 GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,8_2_002880E0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B16FD VirtualQuery,GetSystemInfo,8_2_002B16FD
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-windows-hyper-v-vfpext_31bf3856ad364e35_10.0.19041.610_none_dec94c194a7d9cf6107572b3Hs
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-bpa.resources_31bf3856ad364e35_10.0.19041.1_en-us_168291f09487ebd5
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-integration-rdv-core_31bf3856ad364e35_10.0.19041.1_none_0d51a8a399d5452c
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-debug.resources_31bf3856ad364e35_10.0.19041.1_en-us_5ee8ada67d246bda>
      Source: SrTasks.exe, 00000005.00000003.1119576190.00000140C867B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msft_neteventvmnetworkadatper.format.ps1xmlLMEMX
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-config_31bf3856ad364e35_10.0.19041.928_none_d35bf07ab5380c24cy
      Source: SrTasks.exe, 00000005.00000003.1019699123.00000140C6DF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processset.psd122\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\FFwindows\syswow64\windowspowershell\v1.0\modules\neteventpacketcapture$$msft_neteventvmnetworkadatper.cdxml22\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\66windows\syswow64\windowspowershell\v1.0\modules\iscsi
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vid_31bf3856ad364e35_10.0.19041.1_none_30a02f8ac0551efb
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-drivers-hypervisor_31bf3856ad364e35_10.0.19041.1165_none_a5220d9b1aae684eeb
      Source: file.exe, AutoIt3.exeBinary or memory string: microsoft hyper-v video
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-passthru-parser_31bf3856ad364e35_10.0.19041.1_none_d7dfb451bd621127a3525d6
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-emulatedstorage_31bf3856ad364e35_10.0.19041.1_none_914c74df26ba9a96
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..rvcluster.resources_31bf3856ad364e35_10.0.19041.1_en-us_78dfc47123c58895
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..lebrowser.resources_31bf3856ad364e35_10.0.19041.1_en-us_4373d0692dcd3a06
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-hypervcluster_31bf3856ad364e35_10.0.19041.1_none_a2ace16370124ff4
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-management-clients_31bf3856ad364e35_10.0.19041.1_none_a87cce111f2d21d53a06>
      Source: SrTasks.exe, 00000005.00000003.1019699123.00000140C6DF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processset.psd122\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\FFwindows\system32\windowspowershell\v1.0\modules\neteventpacketcapture$$msft_neteventvmnetworkadatper.cdxml22\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\66windows\system32\windowspowershell\v1.0\modules\iscsi
      Source: SrTasks.exe, 00000005.00000003.1019699123.00000140C77F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: windows.devices.winmd22\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\ttwindows\syswow64\windowspowershell\v1.0\modules\psdesiredstateconfiguration\dscresources\msft_processresource\en-gb msft_processresource.schema.mfl22\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\FFwindows\syswow64\windowspowershell\v1.0\modules\neteventpacketcapture,,msft_neteventvmnetworkadatper.format.ps1xml22\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8ED1000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1078718157.00000140C8EF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-windows-hyper-v-vfpext_31bf3856ad364e35_10.0.19041.1_none_b6a6a2ae8b1ec7b0
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-sysprep-provider_31bf3856ad364e35_10.0.19041.789_none_111728dc239a85e2f0cffQf
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..izationv2.resources_31bf3856ad364e35_10.0.19041.1_en-us_7f1134951b6fe2f2
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-d..s-vmswitch-netsetup_31bf3856ad364e35_10.0.19041.1_none_3a58d94ffaa9d897k
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-lun-parser_31bf3856ad364e35_10.0.19041.1_none_b6d8bfc73f89cc96z
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vhd-parser_31bf3856ad364e35_10.0.19041.1_none_34b87765e20dcc15
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vid_31bf3856ad364e35_10.0.19041.546_none_58a869077fc6e2f7
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-drivers-hypervisor_31bf3856ad364e35_10.0.19041.1_none_e64260e504e2ce32I
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-sysprep-provider_31bf3856ad364e35_10.0.19041.1_none_e9372a65640b0bcf5c8b5
      Source: SrTasks.exe, 00000005.00000003.1119576190.00000140C867B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msft_neteventvmnetworkadatper.format.ps1xmlLMEMX
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmwp_31bf3856ad364e35_10.0.19041.1_none_eb319bc9ff262eec
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..t-remotefilebrowser_31bf3856ad364e35_10.0.19041.746_none_6fbcad1699b89a67
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmwp.resources_31bf3856ad364e35_10.0.19041.1_en-us_369e8b635061fdb3
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..nthfcvdev.resources_31bf3856ad364e35_10.0.19041.1_en-us_6ca4b4247e291981
      Source: AutoIt3.exeBinary or memory string: vmware
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-config_31bf3856ad364e35_10.0.19041.1_none_ab3c0ef9f5d858c0
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-ram-parser.resources_31bf3856ad364e35_10.0.19041.1_en-us_50c23e4c771f203a
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmms.resources_31bf3856ad364e35_10.0.19041.1_en-us_fc0cba9450a52790
      Source: SrTasks.exe, 00000005.00000003.1091747372.00000140CAE50000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1092804079.00000140CAE50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..izationv2.resources_31bf3856ad364e35_10.0.19041.1_en-gb_7788797720472f2d
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..apinabout.resources_31bf3856ad364e35_10.0.19041.1_en-us_d314f4eb3925c8b5
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-kmclr_31bf3856ad364e35_10.0.19041.1_none_884ef285596dd5949487ebd5
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-debug_31bf3856ad364e35_10.0.19041.1_none_ba0c8961643f1b8b
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-h..t-service.resources_31bf3856ad364e35_10.0.19041.1_en-us_ddaeabc80a3525d6=
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmms_31bf3856ad364e35_10.0.19041.1_none_ec871523fe4a3c37Y
      Source: SrTasks.exe, 00000005.00000003.1019699123.00000140C77F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: windows.devices.winmd22\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\ttwindows\system32\windowspowershell\v1.0\modules\psdesiredstateconfiguration\dscresources\msft_processresource\en-gb msft_processresource.schema.mfl22\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\FFwindows\system32\windowspowershell\v1.0\modules\neteventpacketcapture,,msft_neteventvmnetworkadatper.format.ps1xml22\\?\Volume{63c21a82-642d-4153-9cda-ad16c96eec93}\
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-kmcl_31bf3856ad364e35_10.0.19041.1_none_29421b2ffbc5ca5c
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-rdv_31bf3856ad364e35_10.0.19041.1_none_30c4d3b8c03afdd6
      Source: SrTasks.exe, 00000005.00000003.1105652236.00000140CC9A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmdebug.dll
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-hgs_31bf3856ad364e35_10.0.19041.928_none_8573a187d4da526f_4b77111169c26d4a
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..t-remotefilebrowser_31bf3856ad364e35_10.0.19041.1_none_47b46fcdda46dc1d
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-pvhd-parser.resources_31bf3856ad364e35_10.0.19041.1_en-us_0ccb9f4751718744
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-i..ationcomponents-rdv_31bf3856ad364e35_10.0.19041.928_none_1fa9f09ad10e24e0
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-ram-parser_31bf3856ad364e35_10.0.19041.1_none_a7bb53746630ebd34c771f203a.
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-bpa_31bf3856ad364e35_10.0.19041.1_none_555170071aa29c2cX
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-winsock-provider_31bf3856ad364e35_10.0.19041.867_none_b57fce26790eec13ba91fq
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..edstorage.resources_31bf3856ad364e35_10.0.19041.1_en-us_8e6d1518accc0bf5H
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..t-clients.resources_31bf3856ad364e35_10.0.19041.1_en-us_a3e0d97c4c052586
      Source: SrTasks.exe, 00000005.00000003.1082945400.00000140CABE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wow64_microsoft-hyper-v-winsock-provider_31bf3856ad364e35_10.0.19041.1_none_97e0d8d7edeea1649aca3}
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmms_31bf3856ad364e35_10.0.19041.1081_none_ab73ed7a140b868c639767ry
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-synthfcvdev_31bf3856ad364e35_10.0.19041.1_none_f4c869717eb5b208
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-emulatedstorage_31bf3856ad364e35_10.0.19041.928_none_b96c565fe61a4dfa
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-winhvr_31bf3856ad364e35_10.0.19041.1_none_fc5d2e67adee5611
      Source: SrTasks.exe, 00000005.00000002.1136747149.00000140CB6F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmdebug.dll2
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..-client.snapinabout_31bf3856ad364e35_10.0.19041.1_none_43a9017744e82ca8
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-debug_31bf3856ad364e35_10.0.19041.928_none_e22c6ae2239eceef.`J
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..ck-virtualizationv2_31bf3856ad364e35_10.0.19041.1_none_25a2ff96aac272ddj
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmwp_31bf3856ad364e35_10.0.19041.1052_none_aa1b5c7a14ea46dd96271a64
      Source: SrTasks.exe, 00000005.00000003.1111584878.00000140C825C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msft_neteventvmnetworkadatper.cdxmlLMEMH
      Source: SrTasks.exe, 00000005.00000002.1133946144.00000140CB20A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vsmb.resources_31bf3856ad364e35_10.0.19041.423_en-us_f14a4bbefe65ac879'
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-h..rvisor-host-service_31bf3856ad364e35_10.0.19041.1_none_2246f2e6f0441379y
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vsmb_31bf3856ad364e35_10.0.19041.1_none_e5031cd2031d874aZ
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-d..-netsetup.resources_31bf3856ad364e35_10.0.19041.1_en-us_299ac5951a49c2de
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-winsock-provider_31bf3856ad364e35_10.0.19041.1_none_8d8c2e85b98ddf69bcd8
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-3dvideo.resources_31bf3856ad364e35_10.0.19041.1_en-us_1a380741b2ac7b048a5c
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-synthfcvdev_31bf3856ad364e35_10.0.19041.928_none_1ce84af23e15656cTe
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-pvhd-parser_31bf3856ad364e35_10.0.19041.1_none_3f6b6ada79aa7a69
      Source: SrTasks.exe, 00000005.00000003.1110648359.00000140C81BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msft_neteventvmnetworkadatper.cdxmlLMEMHp
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vsmb.resources_31bf3856ad364e35_10.0.19041.1_en-us_c92f752e3f016999
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-hgs_31bf3856ad364e35_10.0.19041.1_none_5d53c007157a9f0b
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..failoverreplication_31bf3856ad364e35_10.0.19041.1_none_50b60ffc14c70fb2W
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-i..ationcomponents-rdv_31bf3856ad364e35_10.0.19041.1_none_f78a0f1a11ae717c/
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-3dvideo_31bf3856ad364e35_10.0.19041.1_none_8b74d6c4b2fcd095;
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-i..nents-rdv.resources_31bf3856ad364e35_10.0.19041.1_en-us_b3d1ef0d088d6955
      Source: SrTasks.exe, 00000005.00000002.1136747149.00000140CB6F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmdebug.dll^
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-integration-rdv-core_31bf3856ad364e35_10.0.19041.964_none_3542494c595902f8Rv
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vid.resources_31bf3856ad364e35_10.0.19041.1_en-us_447494df1222bcd8
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vsmb_31bf3856ad364e35_10.0.19041.928_none_0d22fe52c27d3aaevt
      Source: SrTasks.exe, 00000005.00000003.1098023066.00000140CB120000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1098350547.00000140CB120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-d..s-vmswitch-netsetup_31bf3856ad364e35_10.0.19041.1165_none_f9388606107572b39w
      Source: SrTasks.exe, 00000005.00000003.1105652236.00000140CC9A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmdebug.dll|<
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-winhv_31bf3856ad364e35_10.0.19041.1_none_93cc37f483916b61
      Source: SrTasks.exe, 00000005.00000003.1091747372.00000140CAE50000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1092804079.00000140CAE50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..rvcluster.resources_31bf3856ad364e35_10.0.19041.1_en-gb_71570953289cd4d0-U
      Source: SrTasks.exe, 00000005.00000003.1076846697.00000140C8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-d..ypervisor.resources_31bf3856ad364e35_10.0.19041.1_en-us_c2edb07518552135
      Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012514A7 LdrInitializeThunk,55_2_012514A7
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0102F607 BlockInput,55_2_0102F607
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B5342 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_002B5342
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0026AAA0 CreateFileW,GetLastError,OutputDebugStringW,OutputDebugStringW,SetFilePointer,OutputDebugStringW,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,8_2_0026AAA0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002698C0 LoadLibraryW,GetProcAddress,GetSystemMetrics,GetSystemMetrics,LoadImageW,FreeLibrary,8_2_002698C0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B1EBE mov esi, dword ptr fs:[00000030h]8_2_002B1EBE
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD4BF4 mov eax, dword ptr fs:[00000030h]55_2_00FD4BF4
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0125718A mov eax, dword ptr fs:[00000030h]55_2_0125718A
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0125718A mov eax, dword ptr fs:[00000030h]55_2_0125718A
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01257191 mov eax, dword ptr fs:[00000030h]55_2_01257191
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01257191 mov eax, dword ptr fs:[00000030h]55_2_01257191
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012512A5 mov eax, dword ptr fs:[00000030h]55_2_012512A5
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_012630FE mov eax, dword ptr fs:[00000030h]55_2_012630FE
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F4BF4 mov eax, dword ptr fs:[00000030h]57_2_005F4BF4
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_016AB3DD mov eax, dword ptr fs:[00000030h]57_2_016AB3DD
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_016B12C9 mov eax, dword ptr fs:[00000030h]57_2_016B12C9
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_016B12C9 mov eax, dword ptr fs:[00000030h]57_2_016B12C9
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_016B12C2 mov eax, dword ptr fs:[00000030h]57_2_016B12C2
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_016B12C2 mov eax, dword ptr fs:[00000030h]57_2_016B12C2
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_016BD236 mov eax, dword ptr fs:[00000030h]57_2_016BD236
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B1F2A GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,8_2_002B1F2A
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe"Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B4433 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_002B4433
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0024CEA0 SetUnhandledExceptionFilter,8_2_0024CEA0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B5342 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_002B5342
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B54CF SetUnhandledExceptionFilter,8_2_002B54CF
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B96A3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_002B96A3
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FE2446 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,55_2_00FE2446
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD0E4D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,55_2_00FD0E4D
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD0F9F SetUnhandledExceptionFilter,55_2_00FD0F9F
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD11EE SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,55_2_00FD11EE
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_00602446 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,57_2_00602446
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F0E4D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,57_2_005F0E4D
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F0F9F SetUnhandledExceptionFilter,57_2_005F0F9F
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_005F11EE SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,57_2_005F11EE
      Source: C:\Users\user\AppData\Local\clithe\file.exeMemory protected: page readonly | page read and write | page guard
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101230F LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,55_2_0101230F
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_0028E3A0 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,GetProcessId,AllowSetForegroundWindow,8_2_0028E3A0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_0101C078 SendInput,keybd_event,55_2_0101C078
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01032E89 GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,55_2_01032E89
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10"Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENTJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "wrsa.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "opssvc.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avastui.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avgui.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "nswscsvc.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "sophoshealth.exe"
      Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\kwZvl2ZDr.a3x && del C:\ProgramData\\kwZvl2ZDr.a3x
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\clithe\file.exe file.exe C:\ProgramData\\kwZvl2ZDr.a3x
      Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -noninteractive -nologo -executionpolicy remotesigned -command "c:\users\user\appdata\local\temp\ai_b2dc.ps1 -paths 'c:\users\user\appdata\roaming\your company\your application\prerequisites\file_deleter.ps1','c:\users\user\appdata\roaming\your company\your application\prerequisites\aipackagechainer.exe' -retry_count 10"
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -noninteractive -nologo -executionpolicy remotesigned -command "c:\users\user\appdata\local\temp\ai_b2dc.ps1 -paths 'c:\users\user\appdata\roaming\your company\your application\prerequisites\file_deleter.ps1','c:\users\user\appdata\roaming\your company\your application\prerequisites\aipackagechainer.exe' -retry_count 10"Jump to behavior
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01011C68 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,55_2_01011C68
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_00264710 GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetLastError,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,GetLastError,CloseHandle,8_2_00264710
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.0000000008420000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
      Source: file.exe, AutoIt3.exeBinary or memory string: Shell_TrayWnd
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FD0CA4 cpuid 55_2_00FD0CA4
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,8_2_00294DC0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,8_2_002C6EC2
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,8_2_002CF284
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,8_2_002C73C9
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,8_2_002CF4A0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,8_2_002CF543
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,8_2_002CF58E
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,8_2_002CF629
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,8_2_002CF6C0
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,8_2_002CF920
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_002CFA45
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,8_2_002CFB4B
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,8_2_002CFC27
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,55_2_012401BD
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,55_2_012402C7
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetLocaleInfoA,GetACP,55_2_012466D9
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetLocaleInfoA,55_2_01240AE1
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetLocaleInfoA,55_2_01245141
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetLocaleInfoA,55_2_0124518D
      Source: C:\dbgbkfc\AutoIt3.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,57_2_0169A2F5
      Source: C:\dbgbkfc\AutoIt3.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,57_2_0169A3FF
      Source: C:\dbgbkfc\AutoIt3.exeCode function: GetLocaleInfoA,GetACP,57_2_016A0811
      Source: C:\dbgbkfc\AutoIt3.exeCode function: GetLocaleInfoA,57_2_0169AC19
      Source: C:\dbgbkfc\AutoIt3.exeCode function: GetLocaleInfoA,57_2_0169F279
      Source: C:\dbgbkfc\AutoIt3.exeCode function: GetLocaleInfoA,57_2_0169F2C5
      Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
      Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
      Source: C:\dbgbkfc\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
      Source: C:\dbgbkfc\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
      Source: C:\dbgbkfc\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
      Source: C:\dbgbkfc\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
      Source: C:\Users\user\AppData\Local\clithe\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
      Source: C:\Users\user\AppData\Local\clithe\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
      Source: C:\dbgbkfc\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
      Source: C:\dbgbkfc\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
      Source: C:\dbgbkfc\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
      Source: C:\dbgbkfc\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\SrTasks.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ScheduledJob\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ScheduledJob.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002B4355 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,8_2_002B4355
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FF59C7 GetUserNameW,55_2_00FF59C7
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_00FEB782 GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,55_2_00FEB782
      Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 8_2_002415F0 GetVersionExW,GetVersionExW,IsProcessorFeaturePresent,8_2_002415F0
      Source: C:\Users\user\AppData\Local\clithe\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: SrTasks.exe, 00000005.00000003.1104386050.00000140C94E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: procdump.exe
      Source: SrTasks.exe, 00000005.00000002.1135258014.00000140CB488000.00000004.00000020.00020000.00000000.sdmp, SrTasks.exe, 00000005.00000003.1105418109.00000140CA100000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
      Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 BlobJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

      Stealing of Sensitive Information

      barindex
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt
      Source: AutoIt3.exeBinary or memory string: WIN_81
      Source: AutoIt3.exeBinary or memory string: WIN_XP
      Source: AutoIt3.exeBinary or memory string: WIN_XPe
      Source: AutoIt3.exeBinary or memory string: WIN_VISTA
      Source: Vista Software.tmp, 0000000C.00000003.1090580628.0000000008420000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 15, 1USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
      Source: AutoIt3.exeBinary or memory string: WIN_7
      Source: AutoIt3.exeBinary or memory string: WIN_8
      Source: Yara matchFile source: 0000003A.00000002.1895490189.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000038.00000002.2180979684.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_010323E0 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,55_2_010323E0
      Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 55_2_01031DD8 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,55_2_01031DD8
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_006523E0 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,57_2_006523E0
      Source: C:\dbgbkfc\AutoIt3.exeCode function: 57_2_00651DD8 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,57_2_00651DD8
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure2
      Valid Accounts
      321
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      31
      Disable or Modify Tools
      31
      Input Capture
      2
      System Time Discovery
      Remote Services11
      Archive Collected Data
      2
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomains1
      Replication Through Removable Media
      2
      Native API
      1
      Create Account
      1
      DLL Side-Loading
      11
      Deobfuscate/Decode Files or Information
      LSASS Memory11
      Peripheral Device Discovery
      Remote Desktop Protocol31
      Input Capture
      12
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      Command and Scripting Interpreter
      2
      Valid Accounts
      2
      Valid Accounts
      2
      Obfuscated Files or Information
      Security Account Manager1
      Account Discovery
      SMB/Windows Admin Shares3
      Clipboard Data
      1
      Non-Standard Port
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCron21
      Windows Service
      21
      Access Token Manipulation
      1
      Software Packing
      NTDS4
      File and Directory Discovery
      Distributed Component Object ModelInput Capture2
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchd11
      Registry Run Keys / Startup Folder
      21
      Windows Service
      1
      DLL Side-Loading
      LSA Secrets268
      System Information Discovery
      SSHKeylogging3
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts12
      Process Injection
      1
      File Deletion
      Cached Domain Credentials571
      Security Software Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items11
      Registry Run Keys / Startup Folder
      21
      Masquerading
      DCSync351
      Virtualization/Sandbox Evasion
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
      Valid Accounts
      Proc Filesystem4
      Process Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
      Modify Registry
      /etc/passwd and /etc/shadow11
      Application Window Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron351
      Virtualization/Sandbox Evasion
      Network Sniffing3
      System Owner/User Discovery
      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
      Access Token Manipulation
      Input Capture1
      Remote System Discovery
      Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
      Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task12
      Process Injection
      Keylogging1
      System Network Configuration Discovery
      Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559267 Sample: 740d3a.msi Startdate: 20/11/2024 Architecture: WINDOWS Score: 96 135 pki-goog.l.google.com 2->135 137 c.pki.goog 2->137 139 bg.microsoft.map.fastly.net 2->139 145 Suricata IDS alerts for network traffic 2->145 147 Multi AV Scanner detection for dropped file 2->147 149 .NET source code contains method to dynamically call methods (often used by packers) 2->149 151 Sigma detected: Suspicious Script Execution From Temp Folder 2->151 15 msiexec.exe 96 52 2->15         started        18 svchost.exe 2->18         started        21 AutoIt3.exe 2->21         started        23 msiexec.exe 2 2->23         started        signatures3 process4 dnsIp5 127 C:\Windows\Installer\MSIA70C.tmp, PE32 15->127 dropped 129 C:\Windows\Installer\MSIA499.tmp, PE32 15->129 dropped 131 C:\Windows\Installer\MSIA44A.tmp, PE32 15->131 dropped 133 4 other malicious files 15->133 dropped 25 aipackagechainer.exe 1 3 15->25         started        28 msiexec.exe 33 15->28         started        30 SrTasks.exe 2 15->30         started        141 127.0.0.1 unknown unknown 18->141 32 MSBuild.exe 21->32         started        file6 process7 file8 107 C:\Users\user\AppData\Local\...\AI_B2DC.ps1, ASCII 25->107 dropped 34 Vista Software.exe 2 25->34         started        37 powershell.exe 2 21 25->37         started        109 C:\Users\user\...\aipackagechainer.exe, PE32 28->109 dropped 111 C:\Users\user\AppData\...\Vista Software.exe, PE32 28->111 dropped 113 C:\Users\user\AppData\...\file_deleter.ps1, ASCII 28->113 dropped 39 conhost.exe 30->39         started        process9 file10 103 C:\Users\user\AppData\...\Vista Software.tmp, PE32 34->103 dropped 41 Vista Software.tmp 3 4 34->41         started        44 powershell.exe 37->44         started        46 powershell.exe 37->46         started        48 AutoIt3.exe 37->48         started        50 conhost.exe 37->50         started        process11 file12 115 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 41->115 dropped 52 Vista Software.exe 2 41->52         started        55 conhost.exe 44->55         started        57 conhost.exe 46->57         started        59 MSBuild.exe 48->59         started        process13 file14 105 C:\Users\user\AppData\...\Vista Software.tmp, PE32 52->105 dropped 61 Vista Software.tmp 18 9 52->61         started        process15 file16 119 C:\Users\user\AppData\...\file.exe (copy), PE32 61->119 dropped 121 C:\Users\user\AppData\...\unins000.exe (copy), PE32 61->121 dropped 123 C:\Users\user\AppData\Local\...\is-T9NMH.tmp, PE32 61->123 dropped 125 2 other files (none is malicious) 61->125 dropped 64 file.exe 61->64         started        66 cmd.exe 61->66         started        68 cmd.exe 61->68         started        70 4 other processes 61->70 process17 process18 72 cmd.exe 64->72         started        75 conhost.exe 66->75         started        77 tasklist.exe 66->77         started        79 find.exe 66->79         started        81 conhost.exe 68->81         started        83 tasklist.exe 68->83         started        85 find.exe 68->85         started        87 conhost.exe 70->87         started        89 11 other processes 70->89 signatures19 161 Uses ping.exe to sleep 72->161 163 Uses ping.exe to check the status of other devices and networks 72->163 91 file.exe 72->91         started        95 conhost.exe 72->95         started        97 PING.EXE 72->97         started        process20 file21 117 C:\dbgbkfc\AutoIt3.exe, PE32 91->117 dropped 165 Creates autostart registry keys with suspicious names 91->165 99 MSBuild.exe 91->99         started        signatures22 process23 dnsIp24 143 167.114.47.186, 49711, 56001 OVHFR Canada 99->143 153 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 99->153 155 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 99->155 157 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 99->157 159 2 other signatures 99->159 signatures25

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      740d3a.msi11%ReversingLabs
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-ID1JF.tmp\_isetup\_setup64.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-QVJTJ.tmp\_isetup\_setup64.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\clithe\file.exe (copy)0%ReversingLabs
      C:\Users\user\AppData\Local\clithe\is-IOH31.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\clithe\is-T9NMH.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\clithe\unins000.exe (copy)0%ReversingLabs
      C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe21%ReversingLabs
      C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe0%ReversingLabs
      C:\Windows\Installer\MSIA1F4.tmp0%ReversingLabs
      C:\Windows\Installer\MSIA2A1.tmp0%ReversingLabs
      C:\Windows\Installer\MSIA30F.tmp0%ReversingLabs
      C:\Windows\Installer\MSIA38D.tmp0%ReversingLabs
      C:\Windows\Installer\MSIA44A.tmp0%ReversingLabs
      C:\Windows\Installer\MSIA499.tmp0%ReversingLabs
      C:\Windows\Installer\MSIA70C.tmp0%ReversingLabs
      C:\dbgbkfc\AutoIt3.exe0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%Avira URL Cloudsafe
      http://pesterbdd.com/images/Pester.png40%Avira URL Cloudsafe
      http://www.microsoft.co0%Avira URL Cloudsafe
      https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
      http://www.quovadis.bm00%Avira URL Cloudsafe
      https://www.innosetup.com/0%Avira URL Cloudsafe
      http://pesterbdd.com/images/Pester.png0%Avira URL Cloudsafe
      https://www.remobjects.com/ps0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      bg.microsoft.map.fastly.net
      199.232.210.172
      truefalse
        high
        pki-goog.l.google.com
        142.250.176.195
        truefalse
          high
          c.pki.goog
          unknown
          unknownfalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://pesterbdd.com/images/Pester.png4powershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://github.com/Pester/Pester4powershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUVista Software.exe, 00000009.00000000.1030398261.0000000000A21000.00000020.00000001.01000000.00000008.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nuget.org/NuGet.exepowershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://aka.ms/pscore6lBpowershell.exe, 0000000D.00000002.1072733679.0000000004C31000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://www.remobjects.com/psVista Software.exe, 00000009.00000003.1032807752.000000000366F000.00000004.00001000.00020000.00000000.sdmp, Vista Software.exe, 00000009.00000003.1034717219.000000007F77B000.00000004.00001000.00020000.00000000.sdmp, Vista Software.tmp, 0000000A.00000000.1038233720.0000000000841000.00000020.00000001.01000000.00000009.sdmp, Vista Software.tmp, 0000000C.00000000.1048572672.0000000000B9D000.00000020.00000001.01000000.0000000A.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://contoso.com/powershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://nuget.org/nuget.exepowershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://www.innosetup.com/Vista Software.exe, 00000009.00000003.1032807752.000000000366F000.00000004.00001000.00020000.00000000.sdmp, Vista Software.exe, 00000009.00000003.1034717219.000000007F77B000.00000004.00001000.00020000.00000000.sdmp, Vista Software.tmp, 0000000A.00000000.1038233720.0000000000841000.00000020.00000001.01000000.00000009.sdmp, Vista Software.tmp, 0000000C.00000000.1048572672.0000000000B9D000.00000020.00000001.01000000.0000000A.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.microsoft.copowershell.exe, 0000000D.00000002.1123205050.0000000008814000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contoso.com/Licensepowershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Iconpowershell.exe, 0000000D.00000002.1102319799.0000000005CA4000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.quovadis.bm0powershell.exe, 0000000D.00000002.1070262048.0000000002EE6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1123205050.00000000087F8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1065615160.0000000002FB4000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.autoitscript.com/autoit3/XVista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpfalse
                              high
                              https://ocsp.quovadisoffshore.com0powershell.exe, 0000000D.00000002.1070262048.0000000002EE6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1123205050.00000000087F8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1065615160.0000000002FB4000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.autoitscript.com/autoit3/Vista Software.tmp, 0000000C.00000003.1090580628.000000000842F000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000D.00000002.1072733679.0000000004C31000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.apache.org/licenses/LICENSE-2.0.html4powershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://github.com/Pester/Pesterpowershell.exe, 0000000D.00000002.1072733679.0000000004E5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1069297289.00000000050B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      167.114.47.186
                                      unknownCanada
                                      16276OVHFRtrue
                                      IP
                                      127.0.0.1
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1559267
                                      Start date and time:2024-11-20 11:31:28 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 14m 4s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                      Run name:Suspected VM Detection
                                      Number of analysed new started processes analysed:61
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:740d3a.msi
                                      Detection:MAL
                                      Classification:mal96.troj.spyw.evad.winMSI@86/67@1/2
                                      EGA Information:
                                      • Successful, ratio: 50%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 123
                                      • Number of non-executed functions: 198
                                      Cookbook Comments:
                                      • Found application associated with file extension: .msi
                                      • Exclude process from analysis (whitelisted): dllhost.exe, sppsvc.exe, SgrmBroker.exe, backgroundTaskHost.exe, VSSVC.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 199.232.210.172, 23.51.58.94, 23.44.201.28, 23.44.201.36, 23.44.201.33, 23.44.201.37, 23.44.201.31, 23.44.201.39, 23.44.201.38, 23.44.201.26, 23.44.201.34, 72.21.81.240
                                      • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, www-www.bing.com.trafficmanager.net, wu.azureedge.net, e86303.dscx.akamaiedge.net, www.bing.com.edgekey.net, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net
                                      • Execution Graph export aborted for target MSBuild.exe, PID 9840 because it is empty
                                      • Execution Graph export aborted for target powershell.exe, PID 824 because it is empty
                                      • Execution Graph export aborted for target powershell.exe, PID 8876 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtCreateFile calls found.
                                      • Report size getting too big, too many NtOpenFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • VT rate limit hit for: 740d3a.msi
                                      TimeTypeDescription
                                      05:33:47API Interceptor4x Sleep call for process: SrTasks.exe modified
                                      05:33:52API Interceptor18x Sleep call for process: powershell.exe modified
                                      05:33:53API Interceptor1x Sleep call for process: Vista Software.tmp modified
                                      05:34:07API Interceptor2x Sleep call for process: svchost.exe modified
                                      05:34:51API Interceptor69875x Sleep call for process: MSBuild.exe modified
                                      11:34:48AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce eeacadf "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
                                      11:34:56AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce eeacadf "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      167.114.47.186AI_ChainedPackageFile.VistaSoftware.exeGet hashmaliciousPureCrypterBrowse
                                        Reminder.exeGet hashmaliciousPureCrypterBrowse
                                          KEFttAEb.vbsGet hashmaliciousPureCrypterBrowse
                                            AaronGiles(1).exeGet hashmaliciousPureCrypterBrowse
                                              Reminder.exeGet hashmaliciousPureCrypterBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                bg.microsoft.map.fastly.netAaronGiles(1).exeGet hashmaliciousPureCrypterBrowse
                                                • 199.232.210.172
                                                goodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                                                • 199.232.210.172
                                                MyInstaller_PDFGear.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.210.172
                                                PO-000041492.xlsGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                • 199.232.214.172
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.210.172
                                                Benefit Enrollment -wZ5nusm.pdfGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                6GvQSVIEIu.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.210.172
                                                Benefit Enrollment -eGz8VNb.pdfGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                pki-goog.l.google.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                • 142.250.185.99
                                                l2rP5bxDPg.exeGet hashmaliciousCredential FlusherBrowse
                                                • 142.250.186.35
                                                XUpERCR9nC.lnkGet hashmaliciousDucktailBrowse
                                                • 142.250.65.163
                                                [EXTERNAL] Tribrik Management Limited Shared Document.emlGet hashmaliciousUnknownBrowse
                                                • 142.251.40.195
                                                MAqlwGvuGr.exeGet hashmaliciousSheetRatBrowse
                                                • 142.250.65.163
                                                9fGsCDYKLV.exeGet hashmaliciousFlesh StealerBrowse
                                                • 142.251.40.163
                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                • 172.217.16.131
                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                • 142.250.185.195
                                                40kib.dllGet hashmaliciousUnknownBrowse
                                                • 142.251.35.163
                                                YhONKuZmIa.dllGet hashmaliciousUnknownBrowse
                                                • 142.250.80.3
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                OVHFRAI_ChainedPackageFile.VistaSoftware.exeGet hashmaliciousPureCrypterBrowse
                                                • 167.114.47.186
                                                Reminder.exeGet hashmaliciousPureCrypterBrowse
                                                • 167.114.47.186
                                                KEFttAEb.vbsGet hashmaliciousPureCrypterBrowse
                                                • 167.114.47.186
                                                AaronGiles(1).exeGet hashmaliciousPureCrypterBrowse
                                                • 167.114.47.186
                                                Reminder.exeGet hashmaliciousPureCrypterBrowse
                                                • 167.114.47.186
                                                IBKB.vbsGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                • 51.195.88.199
                                                arm.nn-20241120-0508.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 51.79.4.49
                                                x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 147.135.236.178
                                                https://usapress.info/inside-the-last-words-of-dan-haggerty-aka-grizzly-adams-and-why-he-had-to-pull-the-plug-on-his-wife-of-20-years/Get hashmaliciousUnknownBrowse
                                                • 54.38.113.5
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                28a2c9bd18a11de089ef85a160da29e4AI_ChainedPackageFile.VistaSoftware.exeGet hashmaliciousPureCrypterBrowse
                                                • 23.44.201.15
                                                KEFttAEb.vbsGet hashmaliciousPureCrypterBrowse
                                                • 23.44.201.15
                                                AaronGiles(1).exeGet hashmaliciousPureCrypterBrowse
                                                • 23.44.201.15
                                                Reminder.exeGet hashmaliciousPureCrypterBrowse
                                                • 23.44.201.15
                                                file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                • 23.44.201.15
                                                https://orbistravelassistance.page/app/pages/login.phpGet hashmaliciousUnknownBrowse
                                                • 23.44.201.15
                                                http://mt6j71.p1keesoulharmony.com/Get hashmaliciousHTMLPhisher, EvilProxyBrowse
                                                • 23.44.201.15
                                                https://files-pdf-73j.pages.dev/?e=info@camida.comGet hashmaliciousUnknownBrowse
                                                • 23.44.201.15
                                                file.exeGet hashmaliciousLummaCBrowse
                                                • 23.44.201.15
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                C:\Users\user\AppData\Local\Temp\is-ID1JF.tmp\_isetup\_setup64.tmpAI_ChainedPackageFile.VistaSoftware.exeGet hashmaliciousPureCrypterBrowse
                                                  Reminder.exeGet hashmaliciousPureCrypterBrowse
                                                    KEFttAEb.vbsGet hashmaliciousPureCrypterBrowse
                                                      AaronGiles(1).exeGet hashmaliciousPureCrypterBrowse
                                                        Reminder.exeGet hashmaliciousPureCrypterBrowse
                                                          reservation .exeGet hashmaliciousTVratBrowse
                                                            reservation .exeGet hashmaliciousTVratBrowse
                                                              oZ3vtWXObB.exeGet hashmaliciousTVratBrowse
                                                                wjpP1EOX0L.exeGet hashmaliciousTVratBrowse
                                                                  C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmpAI_ChainedPackageFile.VistaSoftware.exeGet hashmaliciousPureCrypterBrowse
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):9419
                                                                    Entropy (8bit):5.5907946003174525
                                                                    Encrypted:false
                                                                    SSDEEP:192:UYZeqhKU9NfOITNfOkNb3rtK8lE6FaLWuLplaQ4nWhA:UsKUfffbNbbtK8i6FaLWmaQ4nWhA
                                                                    MD5:EA4E3665B43B3E8E630368B726E70B3E
                                                                    SHA1:31FC591ACB688F4673D7AE33C7D8396B38663C40
                                                                    SHA-256:142DC302E6B669FFD90B735CC2D0414CC6549E136361D1848FFBAC40D7C0B190
                                                                    SHA-512:B9AB0B87F83B4505725936171981825B99A0CE25F4537D247AB20DBEF51FCC7C575B83D3D2FD993FE3D8F1574D40B6206B4345F8A062BDA780C535DA4463430C
                                                                    Malicious:false
                                                                    Preview:...@IXOS.@.....@9,tY.@.....@.....@.....@.....@.....@......&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}..Your Application..740d3a.msi.@.....@.....@.....@........&.{D5C03FE6-2CB0-44BC-9C72-3578CFB89255}.....@.....@.....@.....@.......@.....@.....@.......@......Your Application......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{2DB80D4A-91C8-4B46-99C2-BAAC7C0B3006}&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}.@......&.{C7A8C515-ACD3-4411-99AD-EAD9719AE9CF}&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}.@......&.{2DE3D436-1DE1-417A-9EA0-E82AF8BF7D62}&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}.@........CreateFolders..Creating folders..Folder: [1]#.>.C:\Users\user\AppData\Roaming\Your Company\Your Application\.@........WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@....&.Software\Your Company\Your Application...@....(.&...Version..1.0.0'.&...Path>.C:\Users\user\AppData\Roa
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):399
                                                                    Entropy (8bit):4.9506248637089945
                                                                    Encrypted:false
                                                                    SSDEEP:6:Ea3LMse/gReRY+Jy8QVkBMhiYBlSzVq2olnl/hkBdtsuRkYRsj9Yq:Eg5OgRGYdTdhTSzVYnl/hitft2/
                                                                    MD5:B26EA83FECE19FE83D1DB60AD7CD865A
                                                                    SHA1:8D50FCE48323532B0DE52387CD1E229B978333EE
                                                                    SHA-256:67E5A6B8F439107156AB4B3188C4E4753BBB48F0FA98A11AB635717E77E544D5
                                                                    SHA-512:21EBA0C9F1BA9958C75BC9DCF5413C08B421906F5615217CFC7D820790AE9AAAD6B80EB1E46BF2B0D73F843301742D4430E1AF960346F8663B01A4E3758DCBF8
                                                                    Malicious:false
                                                                    Preview:...@IXOS.@.....@9,tY.@.....@.....@.....@.....@.....@......&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}..Your Application..740d3a.msi.@.....@.....@.....@........&.{D5C03FE6-2CB0-44BC-9C72-3578CFB89255}.....@.....@.....@.....@.......@.....@.....@.......@......Your Application......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....AI_LaunchChainer...@.....@.....@....
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):1310720
                                                                    Entropy (8bit):0.13581370329483472
                                                                    Encrypted:false
                                                                    SSDEEP:384:mJHL7HbahIfcjcidIiBysHciXBs78MmhRht43mKdyrf6YM5Z:mJP74rzc8Myr43mNrf6YM5Z
                                                                    MD5:F0141D64B7DEA02186D70B9F0DF28293
                                                                    SHA1:36CF31A8A105D5DA0A66DDEADB24204063457C95
                                                                    SHA-256:520778EFE3719D8BADE097671158FCD4AC9C4E470DD2D2CBA22240DB7DCAABFA
                                                                    SHA-512:6296AFBBF1116DA7C1A9B785C723D67B57C665968AE84D6B953D35BEC16D2861D27E1A8D0426711BB5A529DDF5E45431AD88CA2DF7CE5CF46CF5C2B1AA5415EB
                                                                    Malicious:false
                                                                    Preview:...........@..@.3...{g..*...yo.........<.....).*9...y..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................;..........v[.2}c}c.#.........`h.d...............h.<.....6.:......p..*9...y..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0xd678a1c9, page size 16384, DirtyShutdown, Windows version 10.0
                                                                    Category:dropped
                                                                    Size (bytes):1048576
                                                                    Entropy (8bit):0.8698470206821871
                                                                    Encrypted:false
                                                                    SSDEEP:1536:TSB2qSB2gSjlK/LfDalKohVF8/bGLBSBLil2d/3Cr5DHzk/3A5v7GoCnLKxKHKrx:TapaQK0yfOD8F31Xw
                                                                    MD5:08F1521AEEE4F9D5C75C0A26ACFF6A55
                                                                    SHA1:DD90C6E7EC4EA60BFE37DB57B7B85083AE31850C
                                                                    SHA-256:87953EE1A01F534E6C4A91BFC8B2D511BE93CA2559515427E01EB2A5C7A153D3
                                                                    SHA-512:3329D9EBDF95FD5D85FE6BB08B3E91DDFA60EDA4F5607C9332A82355230A4B07E17507BBCB9B412453A4EECA223C4FA2572DA9EFCAAE99A2AA8237337C9DC20F
                                                                    Malicious:false
                                                                    Preview:.x..... ................p..*9...y........................0..........|).."...|..h.2...........................).*9...y..........................................................................................................bJ......n....@...................................................................................................... ........3...{g.....................................................................................................................................................................................................................................).'.."...|;..................:..."...|...........................#......h.2.....................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):16384
                                                                    Entropy (8bit):0.08164808428811135
                                                                    Encrypted:false
                                                                    SSDEEP:3:yRWlUE5f2sBj4i4uRFE5/ll/pPvillo0lJlbxvws:CiPfHj3LRi5/llhPOL
                                                                    MD5:82D30992C27FD8D0A4590B1665DB7CD1
                                                                    SHA1:578CB2DAEB0988238AEA5C7208F17F807DBBD26E
                                                                    SHA-256:D4678DE2B56DDA110325B68687185BBC033876F190FEBA82B60AFEA020ECB0D0
                                                                    SHA-512:44F0C8F7A7F926CB49CB2B8BD52F344FC688674E22B5062392FFC6DF8A69A52CDB0F99F1D6E646D8A21157468579FB7D43E4505B650764C9E7D80938B7CB491E
                                                                    Malicious:false
                                                                    Preview:...t....................................*9...y..."...|.......|)..............|)......|)..C.t.....|)O.................:..."...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\clithe\file.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):532964
                                                                    Entropy (8bit):7.434809463000461
                                                                    Encrypted:false
                                                                    SSDEEP:12288:/Gulirt5PUlsJIG6QvzsHzdBD8Bf874LT49dbZXa1sLKj:/RliAZysHBBD8BfRObZXa1mKj
                                                                    MD5:B3BB51CF6BE5FBE8EBAA27F06DB4BDA7
                                                                    SHA1:E535B1B4A477ACB1068A4D019AA85A622AA48F4C
                                                                    SHA-256:40B6B58FBEB08A133B56E27C94B0AA7AF7862AFE386E9056744B06BA7B03BBAC
                                                                    SHA-512:A24FD46E30E8829A3CAF93D9B91D6B0A1FFA15E9B7A4F5684A540FC42C8545405E3DED9AF4C659849B806E3644963D3C7645B019AAB3F9311DA5674BD19B62DB
                                                                    Malicious:false
                                                                    Preview:["r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................["r.....................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):4736
                                                                    Entropy (8bit):3.712062778175599
                                                                    Encrypted:false
                                                                    SSDEEP:48:FJejD2oE2RETr/7kVDrjrEmXRyiyBoPZcG48oF7HntwoFd4xVQ1Ud9ZQwovwE5lv:FJED2jHfWPcoBcH8SepVQI9XE56tKDN
                                                                    MD5:530811729232224B665956E381FB6C10
                                                                    SHA1:43FA3BAF1AFEA03406586D03F7CFDD7C2645D242
                                                                    SHA-256:F2D229C473E5D3FA2E736FC5934B23542D70B1EF60943F0F6FE60E72150B0E90
                                                                    SHA-512:50C777D6FB18BF8D144A79A989CB2596ECF554287B2AB7A85A5FD1AE5D618681EF061535238CBC0D6536233C062B5A5D9FAB2A1C7109E96DA86AC368E7330B0B
                                                                    Malicious:false
                                                                    Preview:...j.Y.G..<.&.+._i2<............X.......z.p.<..N...bW4.`..........F.7;..........:..$3.J.C.Na.V............................$.......8.......p...............I.n.s.t.a.l.l.e.d. .Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.................C.:.\.W.i.n.d.o.w.s.\...............7.1.5.5.7.5.................W.O.R.K.G.R.O.U.P.......n6.j:..G.{4VI..H....................DMIO:ID:...c-dSA....n......... ...2.......2...\.\.?.\.V.o.l.u.m.e.{.6.3.c.2.1.a.8.2.-.6.4.2.d.-.4.1.5.3.-.9.c.d.a.-.a.d.1.6.c.9.6.e.e.c.9.3.}.\...............C.:.\...........N).A.j..j...............(...0.......,...2.......2...\.\.?.\.V.o.l.u.m.e.{.6.3.c.2.1.a.8.2.-.6.4.2.d.-.4.1.5.3.-.9.c.d.a.-.a.d.1.6.c.9.6.e.e.c.9.3.}.\.......4...............(.C.:.).........<...@...D...H...L...P...T...X...\...`...d...h...l...%.......%...A.d.o.b.e. .A.c.r.o.b.a.t. .R.e.a.d.e.r. .D.C. .2.1...0.0.7...2.0.0.9.1.................G.o.o.g.l.e. .C.h.r.o.m.e. .1.2.8...0...6.6.1.3...1.2.0.................J.a.v.a. .8. .U.p.d.a.t.e. .3.0.1. .8...0...3.0.1.0...9.........
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):13255872
                                                                    Entropy (8bit):3.6245177735325083
                                                                    Encrypted:false
                                                                    SSDEEP:12288:mYmPwQH9QlO/bLnI1BPMZTGitoem9ecB2l9xwXrZJk51Qg5E0d3pWDfJTNqVE9nu:w4QdoO/v1oem+Hg1ivh+ITIHtP0hhp
                                                                    MD5:8096990327362083550A5B997E88FE53
                                                                    SHA1:383969F5D309A3D63B4F7C75C65B4B662679808C
                                                                    SHA-256:4A2243F3B0BDAB416E38AC1519789A2D0EFC03E775CD53648BD95BF82EEB068B
                                                                    SHA-512:75E4AAB94EBF096C508ADB3F97131499130AC9C286382679EEF0044A35974F13CA02C9AB04AF29F9E615493D53212F6D1B28CE4952D11419BEF96B8D700BA88B
                                                                    Malicious:false
                                                                    Preview:7q$.o.lK.V"....6Kz..............D...................... ...Y.......Y...<.B.A.C.K.U.P._.C.O.M.P.O.N.E.N.T.S. .x.m.l.n.s.=.".x.-.s.c.h.e.m.a.:.#.V.s.s.C.o.m.p.o.n.e.n.t.M.e.t.a.d.a.t.a.". .v.e.r.s.i.o.n.=.".1...2.". .b.o.o.t.a.b.l.e.S.y.s.t.e.m.S.t.a.t.e.B.a.c.k.u.p.=.".y.e.s.". .s.e.l.e.c.t.C.o.m.p.o.n.e.n.t.s.=.".y.e.s.". .b.a.c.k.u.p.T.y.p.e.=.".f.u.l.l.". .p.a.r.t.i.a.l.F.i.l.e.S.u.p.p.o.r.t.=.".y.e.s.". .s.n.a.p.s.h.o.t.S.e.t.I.d.=.".8.7.7.0.b.5.7.a.-.c.d.3.c.-.4.e.f.2.-.a.f.9.f.-.1.b.6.2.5.7.3.4.1.7.6.0.".>.<.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S. .i.n.s.t.a.n.c.e.I.d.=.".f.0.0.8.1.4.4.e.-.5.f.9.d.-.4.b.f.9.-.a.a.a.2.-.7.4.6.9.0.0.e.e.b.f.5.e.". .w.r.i.t.e.r.I.d.=.".e.8.1.3.2.9.7.5.-.6.f.9.3.-.4.4.6.4.-.a.5.3.e.-.1.0.5.0.2.5.3.a.e.2.2.0.". .b.a.c.k.u.p.S.c.h.e.m.a.=.".0.".>.<.C.O.M.P.O.N.E.N.T. .c.o.m.p.o.n.e.n.t.N.a.m.e.=.".S.y.s.t.e.m. .F.i.l.e.s.". .c.o.m.p.o.n.e.n.t.T.y.p.e.=.".f.i.l.e.g.r.o.u.p."./.>.<./.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S.>.<.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S. .i.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):4736
                                                                    Entropy (8bit):3.712062778175599
                                                                    Encrypted:false
                                                                    SSDEEP:48:FJejD2oE2RETr/7kVDrjrEmXRyiyBoPZcG48oF7HntwoFd4xVQ1Ud9ZQwovwE5lv:FJED2jHfWPcoBcH8SepVQI9XE56tKDN
                                                                    MD5:530811729232224B665956E381FB6C10
                                                                    SHA1:43FA3BAF1AFEA03406586D03F7CFDD7C2645D242
                                                                    SHA-256:F2D229C473E5D3FA2E736FC5934B23542D70B1EF60943F0F6FE60E72150B0E90
                                                                    SHA-512:50C777D6FB18BF8D144A79A989CB2596ECF554287B2AB7A85A5FD1AE5D618681EF061535238CBC0D6536233C062B5A5D9FAB2A1C7109E96DA86AC368E7330B0B
                                                                    Malicious:false
                                                                    Preview:...j.Y.G..<.&.+._i2<............X.......z.p.<..N...bW4.`..........F.7;..........:..$3.J.C.Na.V............................$.......8.......p...............I.n.s.t.a.l.l.e.d. .Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.................C.:.\.W.i.n.d.o.w.s.\...............7.1.5.5.7.5.................W.O.R.K.G.R.O.U.P.......n6.j:..G.{4VI..H....................DMIO:ID:...c-dSA....n......... ...2.......2...\.\.?.\.V.o.l.u.m.e.{.6.3.c.2.1.a.8.2.-.6.4.2.d.-.4.1.5.3.-.9.c.d.a.-.a.d.1.6.c.9.6.e.e.c.9.3.}.\...............C.:.\...........N).A.j..j...............(...0.......,...2.......2...\.\.?.\.V.o.l.u.m.e.{.6.3.c.2.1.a.8.2.-.6.4.2.d.-.4.1.5.3.-.9.c.d.a.-.a.d.1.6.c.9.6.e.e.c.9.3.}.\.......4...............(.C.:.).........<...@...D...H...L...P...T...X...\...`...d...h...l...%.......%...A.d.o.b.e. .A.c.r.o.b.a.t. .R.e.a.d.e.r. .D.C. .2.1...0.0.7...2.0.0.9.1.................G.o.o.g.l.e. .C.h.r.o.m.e. .1.2.8...0...6.6.1.3...1.2.0.................J.a.v.a. .8. .U.p.d.a.t.e. .3.0.1. .8...0...3.0.1.0...9.........
                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1400
                                                                    Entropy (8bit):5.34444530197804
                                                                    Encrypted:false
                                                                    SSDEEP:24:ML9E4K1BIKDE4KhKMaKhRAE4KzDAfE4KnKIE4oKnKo9E4KhROtHZsXE4kI3nRe:MxHK1BIYHKh6oRAHKzMfHKntHoAlHKh6
                                                                    MD5:E1C0D648A2CE790CE2D28859A91D6073
                                                                    SHA1:2A59CB9D730F3A9FC84C60016BCEE9EC3F601A32
                                                                    SHA-256:A749AE27848A9302C78BCEF9CA30EDF8BAAC3A0241945DBC04854C6D7072608E
                                                                    SHA-512:4599696290939FB97ADCA8DF7EB71A618F108EA1535C55B876BB4A70BA8359E0C452796FAB3907E268C0A9A9CF9356AABC0B2D6317E9836352C9EDE67F33EC80
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\827465c25133ff582ff7ddaf85635407\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\374ae62ebbde44ef97c7e898f1fdb21b\System.Core.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\10879c5bddb2dd2399e2098d5ca5c9d1\System.Xml.ni.dll",0..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\b863adc9d550931e279ac7e2ee517d1f\System.Configuration.ni.dll",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=n
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):1164
                                                                    Entropy (8bit):5.320209458187512
                                                                    Encrypted:false
                                                                    SSDEEP:24:3N0cYRSGfbo4Kcs4RP8jKzkmAmoUejr1o+mZ9txNBJt/NKqHrVe:WxRSGfs4c4RYdmloUefa+mZ9trBLNPHs
                                                                    MD5:A0F52FEAD94362DE729BE476E2266FDF
                                                                    SHA1:23C2AC2A52836E9CD2AFE32D78B00FCF3382BE44
                                                                    SHA-256:5AD639BA03E9D4FB677B7737BED009EC5F422E797F6CDCE7BDE8B9251971F7A3
                                                                    SHA-512:D414DC5E98C91FB0EE793D3F3A081C934EB990274C73676A8F4665B2F3FFC34F18A68285C516BD1B665460C0C43F0ED228EB3B22401922605B9F5861E6A5FE2D
                                                                    Malicious:false
                                                                    Preview:@...e...........................................................L...............h..t...D.d.u.........!.Microsoft.PowerShell.ScheduledJob...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0...............I.....B..ZR............System..4......................A....E..........System.Core.D................g$H..K..I.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<...............i..VdqF...|...........System.Configuration<................t.,.lG....M...........System.Management...4.................%...K... ...........System.Xml..@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4..................%`99B....9...........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P................1]...E...........(.Microsoft.PowerShell.Command
                                                                    Process:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):23209
                                                                    Entropy (8bit):6.02302501724474
                                                                    Encrypted:false
                                                                    SSDEEP:384:gsurSpJjMPfBJZh+puH/aXAAtyIRWXISPVPXFtlMnOpkpNZRHbaQotu25tbJUuqS:IOpJjMPfBjhj/HkutPXFtleJ3F1oUaJL
                                                                    MD5:467774A57E387C18B5962AEAB412CDF5
                                                                    SHA1:15E5B916C5251A2D58CCA07381860A22E34BF1A5
                                                                    SHA-256:C57C9CE36B104FEBA7B9E0CAD5D37090C87CB3E351EDE658D1000B66ACAD24D9
                                                                    SHA-512:0C821543528827BE0D845421905551B07073D9ACBF7E4BC9F386B4808192E4BD28C27CF86ACCB4F7820F68829A0F4BF311BFE7A10B1388D8B385311A157430DB
                                                                    Malicious:true
                                                                    Preview:param(.. [Parameter(Mandatory = $true)].. [string[]]$paths,.. [int]$retry_count = 0..)....# Delete paths using parallel jobs. ..$jobs = $paths | ForEach-Object {.. Start-Job -ScriptBlock {.. param(.. [string]$path,.. [int]$retry_count = 0.. ).... if (Test-Path -LiteralPath $path) {.. $count = 0.. while ($true) {.. Remove-Item -LiteralPath $path -Force.. if (-not (Test-Path -LiteralPath $path) -or ($count -ge $retry_count)) {.. return;.. }.. $count++.. Start-Sleep -s 5 #sleep 5 seconds.. } .. }.. } -ArgumentList $_, $retry_count ..}....# Wait for the delete jobs to finish..Wait-Job -Job $jobs....# Self delete..Remove-Item -Path $MyInvocation.MyCommand.Source....# SIG # Begin signature block..# MII9bwYJKoZIhvcNAQcCoII9YDCCPVwCAQExDzANBglghkgBZQMEAgEFADB5Bgor..# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMC
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):3615232
                                                                    Entropy (8bit):6.746330366445845
                                                                    Encrypted:false
                                                                    SSDEEP:98304:7JYVM+LtVt3P/KuG2ONG9iqLRQv3330+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh4:6VL/tnHGYiqlmhhhhhhhhhhhhhhhhhhq
                                                                    MD5:584586C0CF548DB94F76F124046D58D9
                                                                    SHA1:63BA86DC3AE44A60C315C29416EE89952F57DACF
                                                                    SHA-256:DD7B6FC3B236D3F6F5C8309B95A0748FEE3FA075E48F68DE381FD68210260FC2
                                                                    SHA-512:B3EF65AE20CA7992AF343397C68F8BE35A15437C24B35E878B9D349D5C9F6AF0FA8CB1BE4F8DA08DCBAD1D0C95DC36CED784F900696CF85F69C8D7A2148EA242
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Joe Sandbox View:
                                                                    • Filename: AI_ChainedPackageFile.VistaSoftware.exe, Detection: malicious, Browse
                                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*..d........*.......*...@...........................8...........@......@...................P,.n.....,.j:...P0......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc.......P0......./.............@..@.............04......`3.............@..@................
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):6144
                                                                    Entropy (8bit):4.720366600008286
                                                                    Encrypted:false
                                                                    SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                    MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                    SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                    SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                    SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Joe Sandbox View:
                                                                    • Filename: AI_ChainedPackageFile.VistaSoftware.exe, Detection: malicious, Browse
                                                                    • Filename: Reminder.exe, Detection: malicious, Browse
                                                                    • Filename: KEFttAEb.vbs, Detection: malicious, Browse
                                                                    • Filename: AaronGiles(1).exe, Detection: malicious, Browse
                                                                    • Filename: Reminder.exe, Detection: malicious, Browse
                                                                    • Filename: reservation .exe, Detection: malicious, Browse
                                                                    • Filename: reservation .exe, Detection: malicious, Browse
                                                                    • Filename: oZ3vtWXObB.exe, Detection: malicious, Browse
                                                                    • Filename: wjpP1EOX0L.exe, Detection: malicious, Browse
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):3615232
                                                                    Entropy (8bit):6.746330366445845
                                                                    Encrypted:false
                                                                    SSDEEP:98304:7JYVM+LtVt3P/KuG2ONG9iqLRQv3330+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh4:6VL/tnHGYiqlmhhhhhhhhhhhhhhhhhhq
                                                                    MD5:584586C0CF548DB94F76F124046D58D9
                                                                    SHA1:63BA86DC3AE44A60C315C29416EE89952F57DACF
                                                                    SHA-256:DD7B6FC3B236D3F6F5C8309B95A0748FEE3FA075E48F68DE381FD68210260FC2
                                                                    SHA-512:B3EF65AE20CA7992AF343397C68F8BE35A15437C24B35E878B9D349D5C9F6AF0FA8CB1BE4F8DA08DCBAD1D0C95DC36CED784F900696CF85F69C8D7A2148EA242
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*..d........*.......*...@...........................8...........@......@...................P,.n.....,.j:...P0......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc.......P0......./.............@..@.............04......`3.............@..@................
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmp
                                                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):6144
                                                                    Entropy (8bit):4.720366600008286
                                                                    Encrypted:false
                                                                    SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                    MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                    SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                    SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                    SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):943784
                                                                    Entropy (8bit):6.621472142472864
                                                                    Encrypted:false
                                                                    SSDEEP:24576:MghN1a6pzWZ12+f+Qa7N4nEIRQ1hOOLkF6av8uh:vhN1aQzJD4BuTxavfh
                                                                    MD5:3F58A517F1F4796225137E7659AD2ADB
                                                                    SHA1:E264BA0E9987B0AD0812E5DD4DD3075531CFE269
                                                                    SHA-256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
                                                                    SHA-512:ACF740AAFCE390D06C6A76C84E7AE7C0F721731973AADBE3E57F2EB63241A01303CC6BF11A3F9A88F8BE0237998B5772BDAF569137D63BA3D0F877E7D27FC634
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......hm..,...,...,.....m.......o.......n.......[.-....h..8....h.......h..>...%t..%...%t......,........h..|....h..-....hc.-...,........h..-...Rich,...........................PE..L...R..Z.........."...............................@.......................................@...@.......@.........................|....P..h............J.......0.. v.........................../..........@............................................text............................... ..`.rdata..............................@..@.data...4p.......H..................@....rsrc...h....P......................@..@.reloc.. v...0...x..................@..B................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):61302
                                                                    Entropy (8bit):7.997489289281888
                                                                    Encrypted:true
                                                                    SSDEEP:1536:DuJTbCqFC3mhFOwLah/4qYkDwlCKA9J7lvUqHUkXun:CtblFbGwLa2kElnANcqHen
                                                                    MD5:F0ECA05CE9A3A95EB161E175654CBB49
                                                                    SHA1:65CF312004A77709C5181DF950F608AFBCAB92F7
                                                                    SHA-256:F50D9901798FB26B80F73685F340E769E16495E9CD7CD902321F474A11FECCB7
                                                                    SHA-512:EDEF43BD7565833C5033CE05CF611194BB6646465BC42F9A996A7C6C5AB6F90DF2E17A13DEC6DB45E1F402D25F6A168C9F2DEB17721D9ACF00769F2A83F3A2B8
                                                                    Malicious:false
                                                                    Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M....D....9..u2.+..^..R.a@.].F.e..EQi.,.......m..%......w4#.....f...\..z..})..4.m....vs.....f..b..O.?.I8..o...K.,.qn...D..................j.......j..kC.R......%x....}...q..U-...(....%....V..?p.h`...55.SZ_S.^q..x.....k>r0...O...9xe7y>.v.T...Ip... .o*z.`7G......i...{Z/....Nk...m.N......c)Y.`.37...i=..T..!..f.....'......b~....j..C...................j..m.....KF....5...x...(nU.j....06.f".].X.:..)...=.H.}.......$......G.............#=._.z.8..7.O..g}.a.Df!..v-."Yj...=c.#..t.E....*Yt].5M".......Q..w.^5.~.o.P....3.?A\U.......?..Cp.~....E.K...9....(...0.=}.{.t4+.o...X).H*.>. .)z.....)-^.....9.....M...#..8..x.....9.i..z.=#R.=i>0..X... M..J.......u.##....Ez....U...Z8..@u.Dj....Yu?.px........(.1.0.S..@......'E.........5.8..B.;..E..q.S...f,..Z?..O..\...#B;<qr6..pw.[D.].9.G%_...........e}! .mj..?....u..6....i]&1...e..-7(VQBo....Y..6..w.'..A..=f6w,+.?..F.tA(./...h.
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):943784
                                                                    Entropy (8bit):6.621472142472864
                                                                    Encrypted:false
                                                                    SSDEEP:24576:MghN1a6pzWZ12+f+Qa7N4nEIRQ1hOOLkF6av8uh:vhN1aQzJD4BuTxavfh
                                                                    MD5:3F58A517F1F4796225137E7659AD2ADB
                                                                    SHA1:E264BA0E9987B0AD0812E5DD4DD3075531CFE269
                                                                    SHA-256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
                                                                    SHA-512:ACF740AAFCE390D06C6A76C84E7AE7C0F721731973AADBE3E57F2EB63241A01303CC6BF11A3F9A88F8BE0237998B5772BDAF569137D63BA3D0F877E7D27FC634
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......hm..,...,...,.....m.......o.......n.......[.-....h..8....h.......h..>...%t..%...%t......,........h..|....h..-....hc.-...,........h..-...Rich,...........................PE..L...R..Z.........."...............................@.......................................@...@.......@.........................|....P..h............J.......0.. v.........................../..........@............................................text............................... ..`.rdata..............................@..@.data...4p.......H..................@....rsrc...h....P......................@..@.reloc.. v...0...x..................@..B................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):532964
                                                                    Entropy (8bit):7.434809463000461
                                                                    Encrypted:false
                                                                    SSDEEP:12288:/Gulirt5PUlsJIG6QvzsHzdBD8Bf874LT49dbZXa1sLKj:/RliAZysHBBD8BfRObZXa1mKj
                                                                    MD5:B3BB51CF6BE5FBE8EBAA27F06DB4BDA7
                                                                    SHA1:E535B1B4A477ACB1068A4D019AA85A622AA48F4C
                                                                    SHA-256:40B6B58FBEB08A133B56E27C94B0AA7AF7862AFE386E9056744B06BA7B03BBAC
                                                                    SHA-512:A24FD46E30E8829A3CAF93D9B91D6B0A1FFA15E9B7A4F5684A540FC42C8545405E3DED9AF4C659849B806E3644963D3C7645B019AAB3F9311DA5674BD19B62DB
                                                                    Malicious:false
                                                                    Preview:["r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................["r.....................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):3639357
                                                                    Entropy (8bit):6.7334924639235485
                                                                    Encrypted:false
                                                                    SSDEEP:98304:zJYVM+LtVt3P/KuG2ONG9iqLRQv3330+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhn:SVL/tnHGYiqlmhhhhhhhhhhhhhhhhhhh
                                                                    MD5:A502816878594E55FE6A4BF0383C9012
                                                                    SHA1:B37FD1BE34B7A76594240F60F226AE3CBD410AA3
                                                                    SHA-256:D4F4F74F71F52E6B17355B5ABEFDA78CFC9A5EB267213F4059922468C56B0277
                                                                    SHA-512:36C3C033E6E6C5B4D82CE5F5E6DFEC9D210B51ECF34A3DDBF3A3062FE27224D6824E15403B778D10A1C3C138450701BB6B0C8452794420F23FD8E5795FCDB7B7
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*..d........*.......*...@...........................8...........@......@...................P,.n.....,.j:...P0......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc.......P0......./.............@..@.............04......`3.............@..@................
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):532964
                                                                    Entropy (8bit):7.434809463000461
                                                                    Encrypted:false
                                                                    SSDEEP:12288:/Gulirt5PUlsJIG6QvzsHzdBD8Bf874LT49dbZXa1sLKj:/RliAZysHBBD8BfRObZXa1mKj
                                                                    MD5:B3BB51CF6BE5FBE8EBAA27F06DB4BDA7
                                                                    SHA1:E535B1B4A477ACB1068A4D019AA85A622AA48F4C
                                                                    SHA-256:40B6B58FBEB08A133B56E27C94B0AA7AF7862AFE386E9056744B06BA7B03BBAC
                                                                    SHA-512:A24FD46E30E8829A3CAF93D9B91D6B0A1FFA15E9B7A4F5684A540FC42C8545405E3DED9AF4C659849B806E3644963D3C7645B019AAB3F9311DA5674BD19B62DB
                                                                    Malicious:false
                                                                    Preview:["r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................["r.....................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):61302
                                                                    Entropy (8bit):7.997489289281888
                                                                    Encrypted:true
                                                                    SSDEEP:1536:DuJTbCqFC3mhFOwLah/4qYkDwlCKA9J7lvUqHUkXun:CtblFbGwLa2kElnANcqHen
                                                                    MD5:F0ECA05CE9A3A95EB161E175654CBB49
                                                                    SHA1:65CF312004A77709C5181DF950F608AFBCAB92F7
                                                                    SHA-256:F50D9901798FB26B80F73685F340E769E16495E9CD7CD902321F474A11FECCB7
                                                                    SHA-512:EDEF43BD7565833C5033CE05CF611194BB6646465BC42F9A996A7C6C5AB6F90DF2E17A13DEC6DB45E1F402D25F6A168C9F2DEB17721D9ACF00769F2A83F3A2B8
                                                                    Malicious:false
                                                                    Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M....D....9..u2.+..^..R.a@.].F.e..EQi.,.......m..%......w4#.....f...\..z..})..4.m....vs.....f..b..O.?.I8..o...K.,.qn...D..................j.......j..kC.R......%x....}...q..U-...(....%....V..?p.h`...55.SZ_S.^q..x.....k>r0...O...9xe7y>.v.T...Ip... .o*z.`7G......i...{Z/....Nk...m.N......c)Y.`.37...i=..T..!..f.....'......b~....j..C...................j..m.....KF....5...x...(nU.j....06.f".].X.:..)...=.H.}.......$......G.............#=._.z.8..7.O..g}.a.Df!..v-."Yj...=c.#..t.E....*Yt].5M".......Q..w.^5.~.o.P....3.?A\U.......?..Cp.~....E.K...9....(...0.=}.{.t4+.o...X).H*.>. .)z.....)-^.....9.....M...#..8..x.....9.i..z.=#R.=i>0..X... M..J.......u.##....Ez....U...Z8..@u.Dj....Yu?.px........(.1.0.S..@......'E.........5.8..B.;..E..q.S...f,..Z?..O..\...#B;<qr6..pw.[D.].9.G%_...........e}! .mj..?....u..6....i]&1...e..-7(VQBo....Y..6..w.'..A..=f6w,+.?..F.tA(./...h.
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:InnoSetup Log 64-bit clithe, version 0x418, 6369 bytes, 715575\37\user\37, C:\Users\user\AppData\Local\clithe\376\3
                                                                    Category:dropped
                                                                    Size (bytes):6369
                                                                    Entropy (8bit):3.895013548774407
                                                                    Encrypted:false
                                                                    SSDEEP:96:8I1W8JbGyaB9MDIdOTOGO/OzOGIuTXdHOk2CfbcuJlEDA4MZAe2L9Q1rHhn0:8I1W8TaBdUSn2yGIuLdHvbP4DSm9EHi
                                                                    MD5:0196B1E043F3845A0E2DE4CA79BFBBA6
                                                                    SHA1:036E46C7D48CA49341916144B2AA8B220B9411AF
                                                                    SHA-256:83375603FA6AB8E77999A64531E046B492B4F0CDCEA1C975B0D8C155FD314F0D
                                                                    SHA-512:8C8BB28B7EB307CC72C7A08AC45F40943043CA03A2134D6BE0CB7031C2D422F6CB971BF37CA278DE49BC95987B4383F88E59900267D8A4430BA9C48F7518D45E
                                                                    Malicious:false
                                                                    Preview:Inno Setup Uninstall Log (b) 64-bit.............................reclosable......................................................................................................................clithe......................................................................................................................................!................................................................................................................TK ..........Q................7.1.5.5.7.5......A.r.t.h.u.r......C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.c.l.i.t.h.e................!.4.... ..............IFPS....%........................................................................................................ANYMETHOD.....................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TMAINFORM....TMAINFORM.........TUNINSTALLPROGRESSFORM....TUNINSTALLPROGRESSFORM.....................TFILETIME.........................!
                                                                    Process:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):3639357
                                                                    Entropy (8bit):6.7334924639235485
                                                                    Encrypted:false
                                                                    SSDEEP:98304:zJYVM+LtVt3P/KuG2ONG9iqLRQv3330+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhn:SVL/tnHGYiqlmhhhhhhhhhhhhhhhhhhh
                                                                    MD5:A502816878594E55FE6A4BF0383C9012
                                                                    SHA1:B37FD1BE34B7A76594240F60F226AE3CBD410AA3
                                                                    SHA-256:D4F4F74F71F52E6B17355B5ABEFDA78CFC9A5EB267213F4059922468C56B0277
                                                                    SHA-512:36C3C033E6E6C5B4D82CE5F5E6DFEC9D210B51ECF34A3DDBF3A3062FE27224D6824E15403B778D10A1C3C138450701BB6B0C8452794420F23FD8E5795FCDB7B7
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*..d........*.......*...@...........................8...........@......@...................P,.n.....,.j:...P0......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc.......P0......./.............@..@.............04......`3.............@..@................
                                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):3306790
                                                                    Entropy (8bit):7.790569470803338
                                                                    Encrypted:false
                                                                    SSDEEP:98304:/wREp+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh7:90hhhhhhhhhhhhhhhhhhhhhhhhhhhhhj
                                                                    MD5:35135E7F357C522D07DDD87307C0345C
                                                                    SHA1:758A12358ED51E44E37F238070F9407B0A017FC4
                                                                    SHA-256:1503447C30588583377509F44B075E99019A59899CA8E2A4B36A6602B39D4DC7
                                                                    SHA-512:D9020A8771277B0108C2CE1ECD07204AFBC88C6B183EBE257FA90C080FE031657CF79346D39B645B1FF8D9AEEF0A926318380E80561DEB19AB584A65E34A9DB3
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f.................t........................@..................................d_...@......@...................p..q....P..........<R...........K2.@)...........................................................R..\....`.......................text....V.......X.................. ..`.itext..d....p.......\.............. ..`.data...88.......:...x..............@....bss....Xr...............................idata.......P......................@....didata......`......................@....edata..q....p......................@..@.tls.....................................rdata..]...........................@..@.reloc..............................@..B.rsrc...<R.......T..................@..@....................................@..@................
                                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):895488
                                                                    Entropy (8bit):6.4269201931011315
                                                                    Encrypted:false
                                                                    SSDEEP:24576:qReoHhWiBkVLQ/8MRdK6C5gU1We373cGx18Zh0:QwVdh1WebcGL8Zh0
                                                                    MD5:2C0130F614EA8C240320EC47D0008EEA
                                                                    SHA1:B4DA50EBBE6ADE459974E0A199F5C780D5AD19F7
                                                                    SHA-256:B78A85120AFAF0C2B7A132ECDB8C2DAA5C18190CEEE3F2F7420C1EDEE205F957
                                                                    SHA-512:381386DF46A30EF457BC2A63E010DFD7C116029D79B79BB8BC9236EBA4B4D673A5D97A4C4E7F1B32604CE653973E9C52B8B0E37F529015D12B13D614DB7BAED4
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c.Rm'.<>'.<>'.<>W8??+.<>W89?..<>7=???.<>7=8?5.<>W88?<.<>7=9?N.<>W8:?&.<>W8=?>.<>'.=>.<>o<5?..<>o<.>&.<>'..>&.<>o<>?&.<>Rich'.<>........PE..L...6..f.........."....).\...J......PM.......p....@..........................P......I;....@............................................../......................p...@...p...........................p...@............p..H...4........................text....[.......\.................. ..`.rdata..Xd...p...f...`..............@..@.data....p..........................@....didat.......`......................@....fptable.....p......................@....rsrc..../.......0..................@..@.reloc..p...........................@..B................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1452
                                                                    Entropy (8bit):3.486079967126399
                                                                    Encrypted:false
                                                                    SSDEEP:24:Q+xvXor+8+Xor/kPEE0XorRkPED5kPEcJXorRkPED5kPE6X7FgXorfzv:rx/JbenEkAnD5nc5AnD5nKZQg
                                                                    MD5:ABE5AC4BC4419E98B03541234C2015B3
                                                                    SHA1:96175F6D2F93A563A8513C1FD5CFAD763D2FE24F
                                                                    SHA-256:CCD7226B005FCB1964FD0AB538B0532C62F23F594360848CDA4E37E2A1AC8934
                                                                    SHA-512:B6C378DCFF179348AE431EEFBED45E461807F2BBFD25B84D83524415A167E0FEE11AF388477C25EB343A79D5C310037124565AADCA5E00E25479A13F40EE1122
                                                                    Malicious:false
                                                                    Preview:..[.G.e.n.e.r.a.l.O.p.t.i.o.n.s.].....O.p.t.i.o.n.s.=.b.h.....D.o.w.n.l.o.a.d.F.o.l.d.e.r.=.C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.Y.o.u.r. .C.o.m.p.a.n.y.\.Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.....E.x.t.r.a.c.t.i.o.n.F.o.l.d.e.r.=.C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.Y.o.u.r. .C.o.m.p.a.n.y.\.Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.....[.P.R.E.R.E.Q.U.I.S.I.T.E.S.].....A.p.p.1.=.V.i.s.t.a. .S.o.f.t.w.a.r.e.....[.A.p.p.1.].....S.e.t.u.p.F.i.l.e.=.C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.Y.o.u.r. .C.o.m.p.a.n.y.\.Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.V.i.s.t.a. .S.o.f.t.w.a.r.e.\.V.i.s.t.a. .S.o.f.t.w.a.r.e...e.x.e.....O.p.t.i.o.n.s.=.i.p.....[.P.R.E.R.E.Q._.C.H.A.I.N.E.R.].....C.l.e.a.n.u.p.F.i.l.e.s.=.C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.Y.o.u.r. .C.o.m.p.a.n.y.\.Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.\.p.r.e.r.e.q.u.i.s.
                                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):23209
                                                                    Entropy (8bit):6.02302501724474
                                                                    Encrypted:false
                                                                    SSDEEP:384:gsurSpJjMPfBJZh+puH/aXAAtyIRWXISPVPXFtlMnOpkpNZRHbaQotu25tbJUuqS:IOpJjMPfBjhj/HkutPXFtleJ3F1oUaJL
                                                                    MD5:467774A57E387C18B5962AEAB412CDF5
                                                                    SHA1:15E5B916C5251A2D58CCA07381860A22E34BF1A5
                                                                    SHA-256:C57C9CE36B104FEBA7B9E0CAD5D37090C87CB3E351EDE658D1000B66ACAD24D9
                                                                    SHA-512:0C821543528827BE0D845421905551B07073D9ACBF7E4BC9F386B4808192E4BD28C27CF86ACCB4F7820F68829A0F4BF311BFE7A10B1388D8B385311A157430DB
                                                                    Malicious:true
                                                                    Preview:param(.. [Parameter(Mandatory = $true)].. [string[]]$paths,.. [int]$retry_count = 0..)....# Delete paths using parallel jobs. ..$jobs = $paths | ForEach-Object {.. Start-Job -ScriptBlock {.. param(.. [string]$path,.. [int]$retry_count = 0.. ).... if (Test-Path -LiteralPath $path) {.. $count = 0.. while ($true) {.. Remove-Item -LiteralPath $path -Force.. if (-not (Test-Path -LiteralPath $path) -or ($count -ge $retry_count)) {.. return;.. }.. $count++.. Start-Sleep -s 5 #sleep 5 seconds.. } .. }.. } -ArgumentList $_, $retry_count ..}....# Wait for the delete jobs to finish..Wait-Job -Job $jobs....# Self delete..Remove-Item -Path $MyInvocation.MyCommand.Source....# SIG # Begin signature block..# MII9bwYJKoZIhvcNAQcCoII9YDCCPVwCAQExDzANBglghkgBZQMEAgEFADB5Bgor..# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMC
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {D5C03FE6-2CB0-44BC-9C72-3578CFB89255}, Number of Words: 10, Subject: Your Application, Author: Your Company, Name of Creating Application: Your Application, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Oct 20 20:36:44 2024, Last Saved Time/Date: Sun Oct 20 20:36:44 2024, Last Printed: Sun Oct 20 20:36:44 2024, Number of Pages: 450
                                                                    Category:dropped
                                                                    Size (bytes):6722560
                                                                    Entropy (8bit):7.310993946697638
                                                                    Encrypted:false
                                                                    SSDEEP:196608:E0hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhV:E8eHZC6kP
                                                                    MD5:64A6CF00B80FE77C16F6DA137DD7A9D1
                                                                    SHA1:F9365C7876AC8934A48237499CF8774FE78EA196
                                                                    SHA-256:630ACEFE136EA2E4BB95211A214E4829D8CB59D4D948B09221E61ACD278854BF
                                                                    SHA-512:FA1FCFB0E4CCE82656A377EF00FB4424860D40B6891FCA29AF240866EFDEC5A20BA16B615488252BE2B438E2415A068BD147A013AA140FE86E1EB061B4E1BC7C
                                                                    Malicious:false
                                                                    Preview:......................>...................g............................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...v.......|.......g.......;...<...=...>...?...@...A...B...C...D...E...F...G...H...j#..k#..l#..m#..n#..o#..p#..q#..r#..s#..t#..u#..v#..w#..x#..y#..d+..e+..f+..g+..h+..i+..j+..k+..l+..m+..n+..o+..p+..q+..`2..w........................................2..............................................................................................................................................................................................................................<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {D5C03FE6-2CB0-44BC-9C72-3578CFB89255}, Number of Words: 10, Subject: Your Application, Author: Your Company, Name of Creating Application: Your Application, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Oct 20 20:36:44 2024, Last Saved Time/Date: Sun Oct 20 20:36:44 2024, Last Printed: Sun Oct 20 20:36:44 2024, Number of Pages: 450
                                                                    Category:dropped
                                                                    Size (bytes):6722560
                                                                    Entropy (8bit):7.310993946697638
                                                                    Encrypted:false
                                                                    SSDEEP:196608:E0hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhV:E8eHZC6kP
                                                                    MD5:64A6CF00B80FE77C16F6DA137DD7A9D1
                                                                    SHA1:F9365C7876AC8934A48237499CF8774FE78EA196
                                                                    SHA-256:630ACEFE136EA2E4BB95211A214E4829D8CB59D4D948B09221E61ACD278854BF
                                                                    SHA-512:FA1FCFB0E4CCE82656A377EF00FB4424860D40B6891FCA29AF240866EFDEC5A20BA16B615488252BE2B438E2415A068BD147A013AA140FE86E1EB061B4E1BC7C
                                                                    Malicious:false
                                                                    Preview:......................>...................g............................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...v.......|.......g.......;...<...=...>...?...@...A...B...C...D...E...F...G...H...j#..k#..l#..m#..n#..o#..p#..q#..r#..s#..t#..u#..v#..w#..x#..y#..d+..e+..f+..g+..h+..i+..j+..k+..l+..m+..n+..o+..p+..q+..`2..w........................................2..............................................................................................................................................................................................................................<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1021792
                                                                    Entropy (8bit):6.608380087035959
                                                                    Encrypted:false
                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1021792
                                                                    Entropy (8bit):6.608380087035959
                                                                    Encrypted:false
                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1021792
                                                                    Entropy (8bit):6.608380087035959
                                                                    Encrypted:false
                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1021792
                                                                    Entropy (8bit):6.608380087035959
                                                                    Encrypted:false
                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1021792
                                                                    Entropy (8bit):6.608380087035959
                                                                    Encrypted:false
                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):908128
                                                                    Entropy (8bit):6.595002426238024
                                                                    Encrypted:false
                                                                    SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                    MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                    SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                    SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                    SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):2241
                                                                    Entropy (8bit):5.708599331415351
                                                                    Encrypted:false
                                                                    SSDEEP:48:F9zVQRRiBjS0qYD8SIgeqanhr7NGbEC0d:F9zOSqwJeHNNcEn
                                                                    MD5:E3B243B493B38B077C572DC310022AAF
                                                                    SHA1:B3C0CABE35D72469EDD16888285FD6963765F1BE
                                                                    SHA-256:9783BF96C348E4969011ADC79903EF8C408169DB5F90F113C4DF57E9166635F8
                                                                    SHA-512:EDB332E23D10782647B67C810570227C095A5201452C579348D988E0F7C2B5B9B185819CC3303FE714A5EADF1B97D822CC2D3D7A41FB0B909972BFF155F67632
                                                                    Malicious:false
                                                                    Preview:...@IXOS.@.....@9,tY.@.....@.....@.....@.....@.....@......&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}..Your Application..740d3a.msi.@.....@.....@.....@........&.{D5C03FE6-2CB0-44BC-9C72-3578CFB89255}.....@.....@.....@.....@.......@.....@.....@.......@......Your Application......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{2DB80D4A-91C8-4B46-99C2-BAAC7C0B3006}>.C:\Users\user\AppData\Roaming\Your Company\Your Application\.@.......@.....@.....@......&.{C7A8C515-ACD3-4411-99AD-EAD9719AE9CF}2.01:\Software\Your Company\Your Application\Version.@.......@.....@.....@......&.{2DE3D436-1DE1-417A-9EA0-E82AF8BF7D62}j.01:\Software\Caphyon\Advanced Installer\Prereqs\{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}\1.0.0\VISTASOFTWARE.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]".>.C:\Users\user\AppData\Roaming\Your Company\Your Application\.@.......
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):908128
                                                                    Entropy (8bit):6.595002426238024
                                                                    Encrypted:false
                                                                    SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                    MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                    SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                    SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                    SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):543
                                                                    Entropy (8bit):5.187609008492708
                                                                    Encrypted:false
                                                                    SSDEEP:12:Eg5TgRGYdTdhTSzVYnl/hitftEkpbHIBDZxSl:hTgIw1SzVaRkpMdxW
                                                                    MD5:10DC4876FC76694E6C05B8BAFA5FCE84
                                                                    SHA1:823BC6C4809270D2F5850137337620389052CFE1
                                                                    SHA-256:132BACADD2980D89EEDDD69187D529926991F44C2A1100FC3EA7D52AF286AADB
                                                                    SHA-512:478CD9B96E9A40AF4ABCAAA18FE6F45815CF195B90A911E38FBF99F0D504B4C26A8EF62E31D4EB530B20B369E090B87F962F72B5F08FF1F975113C024E01E10D
                                                                    Malicious:false
                                                                    Preview:...@IXOS.@.....@9,tY.@.....@.....@.....@.....@.....@......&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}..Your Application..740d3a.msi.@.....@.....@.....@........&.{D5C03FE6-2CB0-44BC-9C72-3578CFB89255}.....@.....@.....@.....@.......@.....@.....@.......@......Your Application......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........AI_LaunchChainer....J...AI_LaunchChainer.@....`.C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe...@.....@.....@....
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.162110438027243
                                                                    Encrypted:false
                                                                    SSDEEP:12:JSbX72FjjAGiLIlHVRpth/7777777777777777777777777vDHFC67XKpSl0i8Q:JNQI5pR7XoF
                                                                    MD5:760B1BEB7DDD2EE755A709006C08C314
                                                                    SHA1:2923571124E79AE58648CB2093462902FB678252
                                                                    SHA-256:905605B286C883F7C830798EB8D8A57C787ABC6E966EB635CEA6FF17B6182A8D
                                                                    SHA-512:BA3B0BA13C11E705533703460264746C1207F0AB9DD563ADDE60380C7D69F2525446E0F043684D8DED26B2216D43FB7E27EBDD0300BBA8EAD1FD688BBE39229C
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.5609463119081397
                                                                    Encrypted:false
                                                                    SSDEEP:48:98PhTuRc06WXJenT5F+fSlhAE4CywTfSlFyy/:ghT11nT7OVzCz
                                                                    MD5:422214F1E303609CE193156153D6AB18
                                                                    SHA1:DD97AA82D77626B6B99D405962C64F0684CEF05B
                                                                    SHA-256:7815B0BEB9610C8CE1CA89CD067C0545D8F0171EB1B88EDD375146365D350FEA
                                                                    SHA-512:6F89CF4BB2E750ED6C6174B1F076A0DCA7E301BA78E5F4914F442504E65C0A0BBF0D5AA5536EE0AD9C324C4FEBE5A27539A7118BE8629BE075E167D3FD3280B5
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):945752
                                                                    Entropy (8bit):5.4113002084340405
                                                                    Encrypted:false
                                                                    SSDEEP:6144:TFfxq8RfKF0Dux6lvJ3c7v/3dd7kGcoyq+H2:TFfxq8xKCE6lVcbP7kGcj2
                                                                    MD5:672AEEE12A4D10FBBA63D5F258694824
                                                                    SHA1:97651CDBA9FC1F2A2193A8BB123BCBFD769F5AA9
                                                                    SHA-256:E6DC57D5D92EE61D614F2E92DB55C1DC37F9111A9EC9C25330BAA7A889728610
                                                                    SHA-512:3A14FD3EA7D281453C97C76104D5F7259B31B5C13247B6B9EE7BB09ED290B258CF8A0CAFFAE04894D318D3DE4E7469D6A2422EA17DB9B09056690024DBA55B46
                                                                    Malicious:false
                                                                    Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 09:59:37.236 [4684]: Command line: D:\wd\compilerTemp\BMT.i51yo0aa.beh\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 09:59:37.255 [4684]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 09:59:37.299 [4684]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 09:59:37.299 [4684]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 09:59:37.299 [
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:JSON data
                                                                    Category:dropped
                                                                    Size (bytes):55
                                                                    Entropy (8bit):4.306461250274409
                                                                    Encrypted:false
                                                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                    Malicious:false
                                                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.2508946393049043
                                                                    Encrypted:false
                                                                    SSDEEP:48:g0LuNO+CFXJ9T5i+fSlhAE4CywTfSlFyy/:9LpVTUOVzCz
                                                                    MD5:358A84CE55B466FD4E3B7991AAB964A7
                                                                    SHA1:66FA91AD95AD8D635D7156F918C7012923725F3A
                                                                    SHA-256:C8716152674849F413E848888A2C6EDABCC4435E73D2E0BC252A2022379B8D3A
                                                                    SHA-512:A124B92C90A7E5F5C0AD3818AAD6C1A18C4488A85365034BBB6BDB6D4295DE16221B7719B00FE2CCFEFF9787B31101D8854969A5B58E8380D799099DD931768F
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.2508946393049043
                                                                    Encrypted:false
                                                                    SSDEEP:48:g0LuNO+CFXJ9T5i+fSlhAE4CywTfSlFyy/:9LpVTUOVzCz
                                                                    MD5:358A84CE55B466FD4E3B7991AAB964A7
                                                                    SHA1:66FA91AD95AD8D635D7156F918C7012923725F3A
                                                                    SHA-256:C8716152674849F413E848888A2C6EDABCC4435E73D2E0BC252A2022379B8D3A
                                                                    SHA-512:A124B92C90A7E5F5C0AD3818AAD6C1A18C4488A85365034BBB6BDB6D4295DE16221B7719B00FE2CCFEFF9787B31101D8854969A5B58E8380D799099DD931768F
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.2508946393049043
                                                                    Encrypted:false
                                                                    SSDEEP:48:g0LuNO+CFXJ9T5i+fSlhAE4CywTfSlFyy/:9LpVTUOVzCz
                                                                    MD5:358A84CE55B466FD4E3B7991AAB964A7
                                                                    SHA1:66FA91AD95AD8D635D7156F918C7012923725F3A
                                                                    SHA-256:C8716152674849F413E848888A2C6EDABCC4435E73D2E0BC252A2022379B8D3A
                                                                    SHA-512:A124B92C90A7E5F5C0AD3818AAD6C1A18C4488A85365034BBB6BDB6D4295DE16221B7719B00FE2CCFEFF9787B31101D8854969A5B58E8380D799099DD931768F
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):0.06913493440520613
                                                                    Encrypted:false
                                                                    SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOCE0O7XpiYtQVky6lS:2F0i8n0itFzDHFC67XfS
                                                                    MD5:054515D24A534599AE0802B60903105F
                                                                    SHA1:F27A778DBA04930D1F8AB514957C692807DC1DFB
                                                                    SHA-256:140247C06F0F48A7A2D793A7F4C8ABFD30BFAECEEF0370DB1F5B9EAC4AA6E7B7
                                                                    SHA-512:0A2AF47BC3E9DEB6562F0B1039982FA0A8047BFE790A2DF09426F27CC08CFBADA7446BCF878E94D9D21BCA2961AB52F8BE57E34EFB13CF29CC9D8EBBA0FC2779
                                                                    Malicious:false
                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.5609463119081397
                                                                    Encrypted:false
                                                                    SSDEEP:48:98PhTuRc06WXJenT5F+fSlhAE4CywTfSlFyy/:ghT11nT7OVzCz
                                                                    MD5:422214F1E303609CE193156153D6AB18
                                                                    SHA1:DD97AA82D77626B6B99D405962C64F0684CEF05B
                                                                    SHA-256:7815B0BEB9610C8CE1CA89CD067C0545D8F0171EB1B88EDD375146365D350FEA
                                                                    SHA-512:6F89CF4BB2E750ED6C6174B1F076A0DCA7E301BA78E5F4914F442504E65C0A0BBF0D5AA5536EE0AD9C324C4FEBE5A27539A7118BE8629BE075E167D3FD3280B5
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):73728
                                                                    Entropy (8bit):0.13639250267793568
                                                                    Encrypted:false
                                                                    SSDEEP:24:x4yAB/5HXoIipVHXoSHXoIipVHXoKAEVHyjCywVjwGG8+:uyy/JfSlRfSlhAE4CywH
                                                                    MD5:96E652B0F3F9E0E6FF3BBD86B878252A
                                                                    SHA1:E688B27776D6F3A020DDFCCFE3A76F2B199BF518
                                                                    SHA-256:F7134CDCFB6C08BC8C82B6FFA48B7AE95571DA51D1A49200F8DFB345F4EE097A
                                                                    SHA-512:E9101C536BE40601B797AAAA12294235DC8E1AACF72DDBC03CAD5B9577343E1065F090FA391DABCD40CBB300EB188216DD039FAA8BCD697CABD8511E78AADFDC
                                                                    Malicious:false
                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.5609463119081397
                                                                    Encrypted:false
                                                                    SSDEEP:48:98PhTuRc06WXJenT5F+fSlhAE4CywTfSlFyy/:ghT11nT7OVzCz
                                                                    MD5:422214F1E303609CE193156153D6AB18
                                                                    SHA1:DD97AA82D77626B6B99D405962C64F0684CEF05B
                                                                    SHA-256:7815B0BEB9610C8CE1CA89CD067C0545D8F0171EB1B88EDD375146365D350FEA
                                                                    SHA-512:6F89CF4BB2E750ED6C6174B1F076A0DCA7E301BA78E5F4914F442504E65C0A0BBF0D5AA5536EE0AD9C324C4FEBE5A27539A7118BE8629BE075E167D3FD3280B5
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.2508946393049043
                                                                    Encrypted:false
                                                                    SSDEEP:48:g0LuNO+CFXJ9T5i+fSlhAE4CywTfSlFyy/:9LpVTUOVzCz
                                                                    MD5:358A84CE55B466FD4E3B7991AAB964A7
                                                                    SHA1:66FA91AD95AD8D635D7156F918C7012923725F3A
                                                                    SHA-256:C8716152674849F413E848888A2C6EDABCC4435E73D2E0BC252A2022379B8D3A
                                                                    SHA-512:A124B92C90A7E5F5C0AD3818AAD6C1A18C4488A85365034BBB6BDB6D4295DE16221B7719B00FE2CCFEFF9787B31101D8854969A5B58E8380D799099DD931768F
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\clithe\file.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):943784
                                                                    Entropy (8bit):6.621472142472864
                                                                    Encrypted:false
                                                                    SSDEEP:24576:MghN1a6pzWZ12+f+Qa7N4nEIRQ1hOOLkF6av8uh:vhN1aQzJD4BuTxavfh
                                                                    MD5:3F58A517F1F4796225137E7659AD2ADB
                                                                    SHA1:E264BA0E9987B0AD0812E5DD4DD3075531CFE269
                                                                    SHA-256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
                                                                    SHA-512:ACF740AAFCE390D06C6A76C84E7AE7C0F721731973AADBE3E57F2EB63241A01303CC6BF11A3F9A88F8BE0237998B5772BDAF569137D63BA3D0F877E7D27FC634
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......hm..,...,...,.....m.......o.......n.......[.-....h..8....h.......h..>...%t..%...%t......,........h..|....h..-....hc.-...,........h..-...Rich,...........................PE..L...R..Z.........."...............................@.......................................@...@.......@.........................|....P..h............J.......0.. v.........................../..........@............................................text............................... ..`.rdata..............................@..@.data...4p.......H..................@....rsrc...h....P......................@..@.reloc.. v...0...x..................@..B................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\clithe\file.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):532964
                                                                    Entropy (8bit):7.434809463000461
                                                                    Encrypted:false
                                                                    SSDEEP:12288:/Gulirt5PUlsJIG6QvzsHzdBD8Bf874LT49dbZXa1sLKj:/RliAZysHBBD8BfRObZXa1mKj
                                                                    MD5:B3BB51CF6BE5FBE8EBAA27F06DB4BDA7
                                                                    SHA1:E535B1B4A477ACB1068A4D019AA85A622AA48F4C
                                                                    SHA-256:40B6B58FBEB08A133B56E27C94B0AA7AF7862AFE386E9056744B06BA7B03BBAC
                                                                    SHA-512:A24FD46E30E8829A3CAF93D9B91D6B0A1FFA15E9B7A4F5684A540FC42C8545405E3DED9AF4C659849B806E3644963D3C7645B019AAB3F9311DA5674BD19B62DB
                                                                    Malicious:false
                                                                    Preview:["r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................["r.....................................
                                                                    Process:C:\Windows\SysWOW64\PING.EXE
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):478
                                                                    Entropy (8bit):4.9404427828211634
                                                                    Encrypted:false
                                                                    SSDEEP:12:PKMRJpTeTeTeTeT0s+sEAFSkIrxMVlmJHaVzvv:/2fAokItULVDv
                                                                    MD5:1D785D889CA617298A68D26DFEF974C4
                                                                    SHA1:1CC36474033E2767B059019B12782CE558F1EA34
                                                                    SHA-256:FE52FE8317F9F07F4AB830F6E3B1F1013BE4AA2A82DD5C86AA805648FC053230
                                                                    SHA-512:EF34C2479BE5BA45B41584887354DE53EA15EC53EA74D57042FF57EB8A609B93DAC9A55297300C29320CE14966FB7704C9952BDC7C6E2DDD0DCA929884091CF3
                                                                    Malicious:false
                                                                    Preview:..Pinging 127.0.0.1 with 32 bytes of data:..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128....Ping statistics for 127.0.0.1:.. Packets: Sent = 5, Received = 5, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                                                    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {D5C03FE6-2CB0-44BC-9C72-3578CFB89255}, Number of Words: 10, Subject: Your Application, Author: Your Company, Name of Creating Application: Your Application, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Oct 20 20:36:44 2024, Last Saved Time/Date: Sun Oct 20 20:36:44 2024, Last Printed: Sun Oct 20 20:36:44 2024, Number of Pages: 450
                                                                    Entropy (8bit):7.310993946697638
                                                                    TrID:
                                                                    • Windows SDK Setup Transform Script (63028/2) 47.91%
                                                                    • Microsoft Windows Installer (60509/1) 46.00%
                                                                    • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                                                    File name:740d3a.msi
                                                                    File size:6'722'560 bytes
                                                                    MD5:64a6cf00b80fe77c16f6da137dd7a9d1
                                                                    SHA1:f9365c7876ac8934a48237499cf8774fe78ea196
                                                                    SHA256:630acefe136ea2e4bb95211a214e4829d8cb59d4d948b09221e61acd278854bf
                                                                    SHA512:fa1fcfb0e4cce82656a377ef00fb4424860d40b6891fca29af240866efdec5a20ba16b615488252be2b438e2415a068bd147a013aa140fe86e1eb061b4e1bc7c
                                                                    SSDEEP:196608:E0hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhV:E8eHZC6kP
                                                                    TLSH:D366D02176CBC03AE16D06725679EB6E503FBD220B3154C7A3E4796D9D307C12A3AA4F
                                                                    File Content Preview:........................>...................g............................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4..
                                                                    Icon Hash:2d2e3797b32b2b99
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2024-11-20T11:34:52.363431+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1167.114.47.18656001192.168.11.2049711TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Nov 20, 2024 11:33:34.945573092 CET804967469.164.46.128192.168.11.20
                                                                    Nov 20, 2024 11:33:34.945913076 CET4967480192.168.11.2069.164.46.128
                                                                    Nov 20, 2024 11:33:34.945980072 CET804967569.164.46.128192.168.11.20
                                                                    Nov 20, 2024 11:33:34.946291924 CET4967580192.168.11.2069.164.46.128
                                                                    Nov 20, 2024 11:33:36.219628096 CET804967969.164.46.128192.168.11.20
                                                                    Nov 20, 2024 11:33:36.219960928 CET4967980192.168.11.2069.164.46.128
                                                                    Nov 20, 2024 11:33:36.219960928 CET4967980192.168.11.2069.164.46.128
                                                                    Nov 20, 2024 11:33:36.314059973 CET804967969.164.46.128192.168.11.20
                                                                    Nov 20, 2024 11:33:49.116588116 CET4967580192.168.11.2069.164.46.128
                                                                    Nov 20, 2024 11:33:49.116588116 CET4967480192.168.11.2069.164.46.128
                                                                    Nov 20, 2024 11:33:49.210643053 CET804967569.164.46.128192.168.11.20
                                                                    Nov 20, 2024 11:33:49.210652113 CET804967469.164.46.128192.168.11.20
                                                                    Nov 20, 2024 11:33:49.217911005 CET49688443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.218091965 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.218112946 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.218532085 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.219264030 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.219274044 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.329637051 CET4434968823.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.329739094 CET4434968823.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.329921961 CET49688443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.330079079 CET49688443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.420934916 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.421180964 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.421272039 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.433195114 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.433211088 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.433542013 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.434076071 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.434163094 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.434185028 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.434215069 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.434264898 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.434273005 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.434426069 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.434572935 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.551666021 CET4970280192.168.11.20142.250.176.195
                                                                    Nov 20, 2024 11:33:49.627253056 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.627495050 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.627926111 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.627976894 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.628144026 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.628247976 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.629704952 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.629704952 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.629719019 CET4434970123.44.201.15192.168.11.20
                                                                    Nov 20, 2024 11:33:49.630325079 CET49701443192.168.11.2023.44.201.15
                                                                    Nov 20, 2024 11:33:49.645757914 CET8049702142.250.176.195192.168.11.20
                                                                    Nov 20, 2024 11:33:49.646030903 CET4970280192.168.11.20142.250.176.195
                                                                    Nov 20, 2024 11:33:49.646301985 CET4970280192.168.11.20142.250.176.195
                                                                    Nov 20, 2024 11:33:49.740355015 CET8049702142.250.176.195192.168.11.20
                                                                    Nov 20, 2024 11:33:49.740804911 CET8049702142.250.176.195192.168.11.20
                                                                    Nov 20, 2024 11:33:49.790997028 CET4970280192.168.11.20142.250.176.195
                                                                    Nov 20, 2024 11:34:06.646905899 CET49689443192.168.11.2020.189.173.18
                                                                    Nov 20, 2024 11:34:06.662317038 CET4969080192.168.11.20192.229.211.108
                                                                    Nov 20, 2024 11:34:06.761303902 CET8049690192.229.211.108192.168.11.20
                                                                    Nov 20, 2024 11:34:06.761523008 CET4969080192.168.11.20192.229.211.108
                                                                    Nov 20, 2024 11:34:06.809968948 CET4434968920.189.173.18192.168.11.20
                                                                    Nov 20, 2024 11:34:06.810322046 CET49689443192.168.11.2020.189.173.18
                                                                    Nov 20, 2024 11:34:10.723892927 CET49683443192.168.11.2040.126.24.84
                                                                    Nov 20, 2024 11:34:10.723896027 CET4968280192.168.11.20192.229.211.108
                                                                    Nov 20, 2024 11:34:10.822858095 CET8049682192.229.211.108192.168.11.20
                                                                    Nov 20, 2024 11:34:10.823100090 CET4968280192.168.11.20192.229.211.108
                                                                    Nov 20, 2024 11:34:10.828077078 CET4434968340.126.24.84192.168.11.20
                                                                    Nov 20, 2024 11:34:10.828298092 CET49683443192.168.11.2040.126.24.84
                                                                    Nov 20, 2024 11:34:12.692271948 CET49687443192.168.11.2040.126.24.84
                                                                    Nov 20, 2024 11:34:12.796392918 CET4434968740.126.24.84192.168.11.20
                                                                    Nov 20, 2024 11:34:12.796591043 CET49687443192.168.11.2040.126.24.84
                                                                    Nov 20, 2024 11:34:16.597676992 CET4969680192.168.11.20104.18.21.226
                                                                    Nov 20, 2024 11:34:16.597680092 CET4969880192.168.11.20104.18.20.226
                                                                    Nov 20, 2024 11:34:16.597680092 CET4969980192.168.11.20104.18.21.226
                                                                    Nov 20, 2024 11:34:16.691777945 CET8049696104.18.21.226192.168.11.20
                                                                    Nov 20, 2024 11:34:16.691978931 CET4969680192.168.11.20104.18.21.226
                                                                    Nov 20, 2024 11:34:16.692100048 CET8049699104.18.21.226192.168.11.20
                                                                    Nov 20, 2024 11:34:16.692224979 CET4969980192.168.11.20104.18.21.226
                                                                    Nov 20, 2024 11:34:16.692236900 CET8049698104.18.20.226192.168.11.20
                                                                    Nov 20, 2024 11:34:16.692488909 CET4969880192.168.11.20104.18.20.226
                                                                    Nov 20, 2024 11:34:30.175888062 CET4434968623.44.201.17192.168.11.20
                                                                    Nov 20, 2024 11:34:30.175971031 CET4434968623.44.201.17192.168.11.20
                                                                    Nov 20, 2024 11:34:30.176100969 CET49686443192.168.11.2023.44.201.17
                                                                    Nov 20, 2024 11:34:30.176165104 CET49686443192.168.11.2023.44.201.17
                                                                    Nov 20, 2024 11:34:50.122231960 CET4970280192.168.11.20142.250.176.195
                                                                    Nov 20, 2024 11:34:50.216460943 CET8049702142.250.176.195192.168.11.20
                                                                    Nov 20, 2024 11:34:50.216630936 CET4970280192.168.11.20142.250.176.195
                                                                    Nov 20, 2024 11:34:51.849390984 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:34:51.963126898 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:34:51.963351011 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:34:51.964349031 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:34:52.118817091 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:34:52.119026899 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:34:52.242650032 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:34:52.242726088 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:34:52.242980957 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:34:52.246674061 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:34:52.363430977 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:34:52.417797089 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:34:53.872780085 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:34:54.040870905 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:34:54.041070938 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:34:54.197096109 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:12.398910046 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:12.557087898 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:12.557255983 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:12.671948910 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:12.725843906 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:12.839494944 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:12.843405008 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:13.010334969 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:13.010585070 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:13.166520119 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:18.089365959 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:18.130902052 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:18.244549036 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:18.287127018 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:27.614851952 CET4434967840.126.24.84192.168.11.20
                                                                    Nov 20, 2024 11:35:29.815287113 CET443496914.152.133.8192.168.11.20
                                                                    Nov 20, 2024 11:35:29.815295935 CET443496914.152.133.8192.168.11.20
                                                                    Nov 20, 2024 11:35:29.815551043 CET49691443192.168.11.204.152.133.8
                                                                    Nov 20, 2024 11:35:29.815630913 CET49691443192.168.11.204.152.133.8
                                                                    Nov 20, 2024 11:35:29.920031071 CET443496914.152.133.8192.168.11.20
                                                                    Nov 20, 2024 11:35:32.409658909 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:32.573534012 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:32.573678017 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:32.688894987 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:32.737063885 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:32.850770950 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:32.852704048 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:33.011082888 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:33.011223078 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:33.167325974 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:49.436697960 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:49.605478048 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:49.606705904 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:49.721451998 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:49.764535904 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:49.878511906 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:49.879210949 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:50.044089079 CET5600149711167.114.47.186192.168.11.20
                                                                    Nov 20, 2024 11:35:50.044395924 CET4971156001192.168.11.20167.114.47.186
                                                                    Nov 20, 2024 11:35:50.199460983 CET5600149711167.114.47.186192.168.11.20
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Nov 20, 2024 11:33:49.454277992 CET6127653192.168.11.201.1.1.1
                                                                    Nov 20, 2024 11:33:49.549132109 CET53612761.1.1.1192.168.11.20
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Nov 20, 2024 11:33:49.454277992 CET192.168.11.201.1.1.10xe7adStandard query (0)c.pki.googA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Nov 20, 2024 11:33:49.549132109 CET1.1.1.1192.168.11.200xe7adNo error (0)c.pki.googpki-goog.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                    Nov 20, 2024 11:33:49.549132109 CET1.1.1.1192.168.11.200xe7adNo error (0)pki-goog.l.google.com142.250.176.195A (IP address)IN (0x0001)false
                                                                    Nov 20, 2024 11:33:49.841412067 CET1.1.1.1192.168.11.200xa80dNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                    Nov 20, 2024 11:33:49.841412067 CET1.1.1.1192.168.11.200xa80dNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                    • c.pki.goog
                                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                                    0192.168.11.2049702142.250.176.19580
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 20, 2024 11:33:49.646301985 CET200OUTGET /r/r1.crl HTTP/1.1
                                                                    Cache-Control: max-age = 3000
                                                                    Connection: Keep-Alive
                                                                    Accept: */*
                                                                    If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
                                                                    User-Agent: Microsoft-CryptoAPI/10.0
                                                                    Host: c.pki.goog
                                                                    Nov 20, 2024 11:33:49.740804911 CET223INHTTP/1.1 304 Not Modified
                                                                    Date: Wed, 20 Nov 2024 10:08:35 GMT
                                                                    Expires: Wed, 20 Nov 2024 10:58:35 GMT
                                                                    Age: 1514
                                                                    Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
                                                                    Cache-Control: public, max-age=3000
                                                                    Vary: Accept-Encoding


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:05:33:38
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\msiexec.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\740d3a.msi"
                                                                    Imagebase:0x7ff689600000
                                                                    File size:69'632 bytes
                                                                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:1
                                                                    Start time:05:33:38
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\msiexec.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\msiexec.exe /V
                                                                    Imagebase:0x7ff689600000
                                                                    File size:69'632 bytes
                                                                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Target ID:5
                                                                    Start time:05:33:46
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\SrTasks.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:8
                                                                    Imagebase:0x7ff6a0410000
                                                                    File size:59'392 bytes
                                                                    MD5 hash:2694D2D28C368B921686FE567BD319EB
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Target ID:6
                                                                    Start time:05:33:47
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:7
                                                                    Start time:05:33:48
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 5A82BF8611EA627E788B63841849825E
                                                                    Imagebase:0xb10000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:8
                                                                    Start time:05:33:49
                                                                    Start date:20/11/2024
                                                                    Path:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe"
                                                                    Imagebase:0x240000
                                                                    File size:895'488 bytes
                                                                    MD5 hash:2C0130F614EA8C240320EC47D0008EEA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:9
                                                                    Start time:05:33:50
                                                                    Start date:20/11/2024
                                                                    Path:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe"
                                                                    Imagebase:0xa20000
                                                                    File size:3'306'790 bytes
                                                                    MD5 hash:35135E7F357C522D07DDD87307C0345C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:Borland Delphi
                                                                    Antivirus matches:
                                                                    • Detection: 21%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:10
                                                                    Start time:05:33:51
                                                                    Start date:20/11/2024
                                                                    Path:C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmp
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\is-2VGF8.tmp\Vista Software.tmp" /SL5="$40454,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe"
                                                                    Imagebase:0x840000
                                                                    File size:3'615'232 bytes
                                                                    MD5 hash:584586C0CF548DB94F76F124046D58D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:Borland Delphi
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:11
                                                                    Start time:05:33:51
                                                                    Start date:20/11/2024
                                                                    Path:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT
                                                                    Imagebase:0xa20000
                                                                    File size:3'306'790 bytes
                                                                    MD5 hash:35135E7F357C522D07DDD87307C0345C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:Borland Delphi
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:12
                                                                    Start time:05:33:52
                                                                    Start date:20/11/2024
                                                                    Path:C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\is-KGGGF.tmp\Vista Software.tmp" /SL5="$50454,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT
                                                                    Imagebase:0x920000
                                                                    File size:3'615'232 bytes
                                                                    MD5 hash:584586C0CF548DB94F76F124046D58D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:Borland Delphi
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Has exited:true

                                                                    Target ID:13
                                                                    Start time:05:33:52
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_B2DC.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10"
                                                                    Imagebase:0x570000
                                                                    File size:433'152 bytes
                                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:14
                                                                    Start time:05:33:52
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:15
                                                                    Start time:05:33:52
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                                                                    Imagebase:0x570000
                                                                    File size:433'152 bytes
                                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:16
                                                                    Start time:05:33:53
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:17
                                                                    Start time:05:33:53
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                                                                    Imagebase:0x570000
                                                                    File size:433'152 bytes
                                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:18
                                                                    Start time:05:33:53
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:19
                                                                    Start time:05:33:53
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
                                                                    Imagebase:0x7ff654940000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:20
                                                                    Start time:05:33:53
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:21
                                                                    Start time:05:33:53
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
                                                                    Imagebase:0x7ff7bc1e0000
                                                                    File size:106'496 bytes
                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:22
                                                                    Start time:05:33:53
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\find.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:find /I "wrsa.exe"
                                                                    Imagebase:0x7ff64ef80000
                                                                    File size:17'920 bytes
                                                                    MD5 hash:AE3F3DC3ED900F2A582BAD86A764508C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:23
                                                                    Start time:05:33:53
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
                                                                    Imagebase:0x7ff654940000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:24
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:25
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
                                                                    Imagebase:0x7ff7bc1e0000
                                                                    File size:106'496 bytes
                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:26
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\find.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:find /I "opssvc.exe"
                                                                    Imagebase:0x7ff64ef80000
                                                                    File size:17'920 bytes
                                                                    MD5 hash:AE3F3DC3ED900F2A582BAD86A764508C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:27
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
                                                                    Imagebase:0x7ff654940000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:28
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:29
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
                                                                    Imagebase:0x7ff7bc1e0000
                                                                    File size:106'496 bytes
                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:30
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\find.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:find /I "avastui.exe"
                                                                    Imagebase:0x7ff64ef80000
                                                                    File size:17'920 bytes
                                                                    MD5 hash:AE3F3DC3ED900F2A582BAD86A764508C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:31
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
                                                                    Imagebase:0x7ff654940000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:32
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:33
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
                                                                    Imagebase:0x7ff7bc1e0000
                                                                    File size:106'496 bytes
                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:34
                                                                    Start time:05:33:54
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\find.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:find /I "avgui.exe"
                                                                    Imagebase:0x7ff64ef80000
                                                                    File size:17'920 bytes
                                                                    MD5 hash:AE3F3DC3ED900F2A582BAD86A764508C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:35
                                                                    Start time:05:33:55
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
                                                                    Imagebase:0x7ff654940000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:36
                                                                    Start time:05:33:55
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:37
                                                                    Start time:05:33:55
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
                                                                    Imagebase:0x7ff7bc1e0000
                                                                    File size:106'496 bytes
                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:38
                                                                    Start time:05:33:55
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\find.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:find /I "nswscsvc.exe"
                                                                    Imagebase:0x7ff64ef80000
                                                                    File size:17'920 bytes
                                                                    MD5 hash:AE3F3DC3ED900F2A582BAD86A764508C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:39
                                                                    Start time:05:33:55
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
                                                                    Imagebase:0x7ff654940000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:40
                                                                    Start time:05:33:55
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:41
                                                                    Start time:05:33:55
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
                                                                    Imagebase:0x7ff7bc1e0000
                                                                    File size:106'496 bytes
                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:42
                                                                    Start time:05:33:55
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\find.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:find /I "sophoshealth.exe"
                                                                    Imagebase:0x7ff64ef80000
                                                                    File size:17'920 bytes
                                                                    MD5 hash:AE3F3DC3ED900F2A582BAD86A764508C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:43
                                                                    Start time:05:33:56
                                                                    Start date:20/11/2024
                                                                    Path:C:\Users\user\AppData\Local\clithe\file.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Local\clithe\\file.exe" "C:\Users\user\AppData\Local\clithe\\millhouse1.a3x"
                                                                    Imagebase:0xfb0000
                                                                    File size:943'784 bytes
                                                                    MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:44
                                                                    Start time:05:34:07
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                    Imagebase:0x7ff622340000
                                                                    File size:57'360 bytes
                                                                    MD5 hash:F586835082F632DC8D9404D83BC16316
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:52
                                                                    Start time:05:34:36
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\kwZvl2ZDr.a3x && del C:\ProgramData\\kwZvl2ZDr.a3x
                                                                    Imagebase:0xa80000
                                                                    File size:236'544 bytes
                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:53
                                                                    Start time:05:34:36
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6ae1e0000
                                                                    File size:875'008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:54
                                                                    Start time:05:34:36
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\SysWOW64\PING.EXE
                                                                    Wow64 process (32bit):true
                                                                    Commandline:ping -n 5 127.0.0.1
                                                                    Imagebase:0xb70000
                                                                    File size:18'944 bytes
                                                                    MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:55
                                                                    Start time:05:34:40
                                                                    Start date:20/11/2024
                                                                    Path:C:\Users\user\AppData\Local\clithe\file.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:file.exe C:\ProgramData\\kwZvl2ZDr.a3x
                                                                    Imagebase:0xfb0000
                                                                    File size:943'784 bytes
                                                                    MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:Borland Delphi
                                                                    Has exited:true

                                                                    Target ID:56
                                                                    Start time:05:34:44
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    Imagebase:0xb30000
                                                                    File size:262'432 bytes
                                                                    MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000038.00000002.2180979684.0000000003061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Has exited:false

                                                                    Target ID:57
                                                                    Start time:05:34:56
                                                                    Start date:20/11/2024
                                                                    Path:C:\dbgbkfc\AutoIt3.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
                                                                    Imagebase:0x5d0000
                                                                    File size:943'784 bytes
                                                                    MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:Borland Delphi
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Has exited:true

                                                                    Target ID:58
                                                                    Start time:05:34:59
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    Imagebase:0xbf0000
                                                                    File size:262'432 bytes
                                                                    MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000003A.00000002.1895490189.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Has exited:true

                                                                    Target ID:59
                                                                    Start time:05:35:04
                                                                    Start date:20/11/2024
                                                                    Path:C:\dbgbkfc\AutoIt3.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
                                                                    Imagebase:0x5d0000
                                                                    File size:943'784 bytes
                                                                    MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:Borland Delphi
                                                                    Has exited:true

                                                                    Target ID:60
                                                                    Start time:05:35:07
                                                                    Start date:20/11/2024
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    Imagebase:0xc30000
                                                                    File size:262'432 bytes
                                                                    MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:5.3%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:15.4%
                                                                      Total number of Nodes:2000
                                                                      Total number of Limit Nodes:25
                                                                      execution_graph 55873 24b870 55874 24b8a5 55873->55874 55875 24b9bf 55873->55875 55874->55875 55893 24ab00 55874->55893 55882 24b9a6 55875->55882 56072 243620 55875->56072 55877 24ba16 55879 243620 2 API calls 55877->55879 55881 24ba20 55879->55881 55880 24b9f3 55883 24b917 55884 24b96a 55883->55884 56046 2439b0 55883->56046 56071 24c3a0 74 API calls 55884->56071 55887 24b8c4 55887->55875 55887->55880 55887->55883 55889 24b92f 56061 245060 55889->56061 55894 24b436 55893->55894 55895 24ab5b 55893->55895 55896 243620 2 API calls 55894->55896 55895->55894 55897 24ab64 55895->55897 55898 24b440 55896->55898 55899 24ac39 55897->55899 55902 2439b0 54 API calls 55897->55902 56418 2b98af 44 API calls 55898->56418 56076 2b2684 55899->56076 55916 24ab85 55902->55916 55903 24b445 56419 2bf99b 44 API calls 55903->56419 55904 24ac59 56086 24d0b0 55904->56086 55906 24b45b 55909 243620 2 API calls 55906->55909 55908 24b44a 56420 2b2e9d 45 API calls 55908->56420 55912 24b465 55909->55912 55914 243620 2 API calls 55912->55914 55917 24b46f 55914->55917 55916->55906 55919 245060 46 API calls 55916->55919 55920 243620 2 API calls 55917->55920 55921 24abc4 55919->55921 55922 24b479 55920->55922 55924 24abec 55921->55924 55927 24abdb 55921->55927 56421 2469b0 55922->56421 55923 24ac96 55923->55923 56149 24d510 55923->56149 56370 26a750 147 API calls 55924->56370 55930 245060 46 API calls 55927->55930 55929 24abfd 55929->55899 55930->55924 55934 243c00 46 API calls 55935 24b589 55934->55935 55937 2b43d4 3 API calls 55935->55937 55936 24acd0 56173 266ce0 55936->56173 55939 24b5d9 55937->55939 55941 2bfbcc 54 API calls 55939->55941 55940 24adf0 56193 246bc0 55940->56193 55943 24b60e 55941->55943 55945 24b61f 55943->55945 55946 24b71b 55943->55946 55948 254840 49 API calls 55945->55948 56439 2b2e9d 45 API calls 55946->56439 55951 24b64c 55948->55951 55950 24ae0c 55953 243c00 46 API calls 55950->55953 55952 24b72c 55951->55952 55955 24b663 55951->55955 56440 2bf99b 44 API calls 55952->56440 55954 24ae30 55953->55954 56210 246700 55954->56210 55958 24b6a5 55955->55958 55959 24b731 55955->55959 55962 2443b0 44 API calls 55958->55962 56441 2b98af 44 API calls 55959->56441 55961 24ae48 55964 24aed2 55961->55964 55966 243c00 46 API calls 55961->55966 55965 24b6d2 55962->55965 55970 2443b0 44 API calls 55964->55970 55982 24aefa 55964->55982 55967 2443b0 44 API calls 55965->55967 55968 24ae74 55966->55968 55969 24b6e1 55967->55969 55971 246700 lstrcmpiW 55968->55971 55972 2443b0 44 API calls 55969->55972 55970->55982 55973 24ae8f 55971->55973 55974 24b700 55972->55974 55973->55964 55979 243c00 46 API calls 55973->55979 55977 2b43af 5 API calls 55974->55977 55975 24afc8 56215 2b43d4 55975->56215 55976 24b069 56252 264710 55976->56252 55980 24b717 55977->55980 55985 24aeb7 55979->55985 55980->55887 55981 24afa0 55981->55975 55981->55976 55982->55898 55982->55981 55990 246700 lstrcmpiW 55985->55990 55987 24b076 55995 243c00 46 API calls 55987->55995 55988 24b121 55991 2439b0 54 API calls 55988->55991 55990->55964 55993 24b126 55991->55993 55992 24b00f 55992->55908 56237 254840 55992->56237 55993->55906 55994 24b131 55993->55994 56001 24b167 55994->56001 56002 24b15c 55994->56002 55997 24b0ac 55995->55997 55999 243c00 46 API calls 55997->55999 55998 24b03c 55998->55903 56021 24b05e 55998->56021 56003 24b0e9 55999->56003 56000 24b2d0 56004 24b35c 56000->56004 56008 2439b0 54 API calls 56000->56008 56385 245680 56001->56385 56372 245350 56002->56372 56371 24ba30 173 API calls 56003->56371 56290 24c8d0 56004->56290 56013 24b2e2 56008->56013 56010 2439b0 54 API calls 56015 24b1f1 56010->56015 56011 24b165 56270 267bd0 56011->56270 56012 24b101 56016 2443b0 44 API calls 56012->56016 56013->55917 56018 24b2ec 56013->56018 56014 24b370 56308 27ff10 56014->56308 56015->55912 56019 24b1fb 56015->56019 56020 24b110 56016->56020 56025 245060 46 API calls 56018->56025 56026 245060 46 API calls 56019->56026 56022 2443b0 44 API calls 56020->56022 56021->56000 56021->56004 56021->56010 56022->56021 56023 24b39b 56024 24b3b6 Sleep 56023->56024 56032 24b3c1 56023->56032 56024->56032 56028 24b316 56025->56028 56027 24b225 56026->56027 56407 269710 70 API calls 56027->56407 56409 265f60 68 API calls 56028->56409 56031 24b23a 56035 24b269 56031->56035 56040 24b25b 56031->56040 56036 2443b0 44 API calls 56032->56036 56033 24b326 56410 26a750 147 API calls 56033->56410 56408 26a750 147 API calls 56035->56408 56039 24b413 56036->56039 56037 24b331 56037->56004 56411 2b43af 56039->56411 56042 245060 46 API calls 56040->56042 56042->56035 56043 24b42d 56043->55887 56044 24b277 56044->56000 56047 2439e8 56046->56047 56049 243a3c 56046->56049 56931 2b46af AcquireSRWLockExclusive 56047->56931 56050 2b46af 3 API calls 56049->56050 56060 243ac7 56049->56060 56052 243a56 56050->56052 56051 2439f2 56051->56049 56053 2439fe GetProcessHeap 56051->56053 56052->56060 56938 2b494f 47 API calls 56052->56938 56936 2b494f 47 API calls 56053->56936 56056 243a2b 56937 2b465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 56056->56937 56057 243ab6 56939 2b465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 56057->56939 56060->55877 56060->55889 56066 2450f3 56061->56066 56067 245088 56061->56067 56062 243620 2 API calls 56063 245140 56062->56063 56064 245121 56070 26a750 147 API calls 56064->56070 56066->56062 56066->56064 56067->56066 56941 2b9d3e 13 API calls 56067->56941 56068 24510f 56942 2b989f 44 API calls 56068->56942 56070->55884 56071->55882 56073 24362e 56072->56073 56074 2b6215 RaiseException 56073->56074 56075 24363b RtlAllocateHeap 56074->56075 56075->55877 56077 2b2690 56076->56077 56442 2b28c7 56077->56442 56080 2b26b6 56448 2b291f 56080->56448 56083 2b26ae 56456 2b280a 46 API calls 56083->56456 56085 2b2709 56085->55904 56087 2b28c7 45 API calls 56086->56087 56088 24d0f2 56087->56088 56089 2b28c7 45 API calls 56088->56089 56093 24d13c 56088->56093 56090 24d114 56089->56090 56094 2b291f 2 API calls 56090->56094 56091 2b291f 2 API calls 56092 24d28c 56091->56092 56095 2b43af 5 API calls 56092->56095 56097 2b43d4 3 API calls 56093->56097 56110 24d188 56093->56110 56094->56093 56096 24ac6f 56095->56096 56111 248d00 56096->56111 56098 24d196 56097->56098 56461 254420 44 API calls 56098->56461 56100 24d1ae 56462 2492d0 56100->56462 56110->56091 56112 2b28c7 45 API calls 56111->56112 56113 248d4f 56112->56113 56114 2b28c7 45 API calls 56113->56114 56117 248d99 56113->56117 56115 248d71 56114->56115 56118 2b291f 2 API calls 56115->56118 56116 2b291f 2 API calls 56119 248f10 56116->56119 56120 2b43d4 3 API calls 56117->56120 56131 248df1 56117->56131 56118->56117 56132 24cee0 56119->56132 56121 248dff 56120->56121 56122 2492d0 73 API calls 56121->56122 56123 248e32 56122->56123 56517 2b2cc2 44 API calls 56123->56517 56125 248e7a 56518 2b2963 44 API calls 56125->56518 56127 248e8d 56519 24a5f0 72 API calls 56127->56519 56129 248ecf 56520 2b2652 RaiseException EnterCriticalSection LeaveCriticalSection 56129->56520 56131->56116 56133 2b43d4 3 API calls 56132->56133 56134 24cf73 56133->56134 56521 24e0a0 56134->56521 56139 24d0a3 56551 24dae0 45 API calls 56139->56551 56140 24d02c 56540 24dfd0 56140->56540 56146 24d03f 56547 254650 56146->56547 56148 24d090 56148->55923 56150 24d55c 56149->56150 56151 24d548 56149->56151 56580 24d880 45 API calls 56150->56580 56151->55936 56153 24d589 56581 24e480 45 API calls 56153->56581 56155 24d5a2 56586 24da10 44 API calls 56155->56586 56156 24d59e 56156->56155 56582 24e150 45 API calls 56156->56582 56159 24d63c 56587 24da10 44 API calls 56159->56587 56161 24d652 56163 254650 44 API calls 56161->56163 56162 24d60f 56585 24e480 45 API calls 56162->56585 56166 24d667 56163->56166 56588 24da10 44 API calls 56166->56588 56167 24d5dc 56167->56155 56167->56162 56583 24e480 45 API calls 56167->56583 56584 24e150 45 API calls 56167->56584 56169 24d689 56171 254650 44 API calls 56169->56171 56172 24d6a7 56171->56172 56172->55936 56589 25e310 56173->56589 56175 24adb5 56176 243c00 56175->56176 56177 243cd1 56176->56177 56180 243c14 56176->56180 56659 243ea0 45 API calls 56177->56659 56179 243c6d 56192 243c19 56179->56192 56660 2b98af 44 API calls 56179->56660 56181 243ccc 56180->56181 56184 243c60 56180->56184 56185 243c9b 56180->56185 56180->56192 56658 2442d0 RaiseException 56181->56658 56184->56181 56188 243c67 56184->56188 56187 2b43d4 3 API calls 56185->56187 56187->56192 56191 2b43d4 3 API calls 56188->56191 56191->56179 56192->55940 56661 242040 56193->56661 56195 246c08 56678 246cc0 56195->56678 56199 246c36 56201 246c58 56199->56201 56710 242940 45 API calls 56199->56710 56200 2443b0 44 API calls 56203 246c95 56200->56203 56201->56200 56204 2b43af 5 API calls 56203->56204 56205 246cad 56204->56205 56206 2443b0 56205->56206 56207 2443fe 56206->56207 56209 2443dd 56206->56209 56207->55950 56209->55950 56209->56206 56209->56207 56719 2b98af 44 API calls 56209->56719 56212 2467ad 56210->56212 56213 24671a 56210->56213 56211 246866 56211->55961 56212->56211 56214 24684a lstrcmpiW 56212->56214 56213->55961 56214->55961 56216 2b43d9 56215->56216 56217 24afd6 56216->56217 56219 2b43f5 56216->56219 56720 2c3cf0 EnterCriticalSection LeaveCriticalSection 56216->56720 56222 2bfbcc 56217->56222 56721 2b6215 56219->56721 56221 2b5331 56223 2bfbd9 56222->56223 56224 2bfbed 56222->56224 56724 2b9d3e 13 API calls 56223->56724 56726 2bfb7c 16 API calls 56224->56726 56227 2bfbf9 56229 2bfc02 CreateThread 56227->56229 56231 2bfc2d 56227->56231 56228 2bfbde 56725 2b989f 44 API calls 56228->56725 56229->56231 56232 2bfc21 GetLastError 56229->56232 56729 2bfa70 49 API calls 56229->56729 56728 2bfaee 15 API calls 56231->56728 56727 2b9ce2 13 API calls 56232->56727 56233 2bfbe9 56233->55992 56236 2bfc38 56236->55992 56238 254877 56237->56238 56239 254850 GetCurrentThreadId 56237->56239 56731 2b2e9d 45 API calls 56238->56731 56241 25487e 56239->56241 56242 25485a 56239->56242 56732 2b2e9d 45 API calls 56241->56732 56730 2b2f0c WaitForSingleObjectEx GetExitCodeThread CloseHandle 56242->56730 56245 254866 56246 254885 56245->56246 56247 25486d 56245->56247 56733 2b2e9d 45 API calls 56246->56733 56247->55998 56253 26475d GetCurrentProcess OpenProcessToken 56252->56253 56255 264786 GetTokenInformation 56253->56255 56256 264779 GetLastError 56253->56256 56258 2647d7 56255->56258 56259 2647a7 GetLastError 56255->56259 56257 264830 56256->56257 56262 26485b CloseHandle 56257->56262 56263 264869 56257->56263 56260 2647dd AllocateAndInitializeSid 56258->56260 56261 26482a GetLastError 56258->56261 56259->56261 56264 2647b2 56259->56264 56260->56257 56265 26480e EqualSid FreeSid 56260->56265 56261->56257 56262->56263 56266 2b43af 5 API calls 56263->56266 56734 264890 56264->56734 56265->56257 56268 24b06e 56266->56268 56268->55987 56268->55988 56271 266ce0 65 API calls 56270->56271 56272 267c3f 56271->56272 56273 267c95 56272->56273 56274 267c75 56272->56274 56276 246070 46 API calls 56273->56276 56741 266400 56274->56741 56277 267c7f 56276->56277 56278 246070 46 API calls 56277->56278 56279 267cbc 56278->56279 56280 266ce0 65 API calls 56279->56280 56281 267d45 ShellExecuteExW 56280->56281 56282 267d71 56281->56282 56283 267d5e 56281->56283 56285 267d78 WaitForSingleObject 56282->56285 56289 267d6d 56282->56289 56284 267d65 GetLastError 56283->56284 56283->56289 56284->56289 56286 267d92 56285->56286 56287 267d88 GetExitCodeProcess 56285->56287 56288 267d99 CloseHandle 56286->56288 56286->56289 56287->56286 56288->56289 56289->56021 56291 2439b0 54 API calls 56290->56291 56292 24c900 56291->56292 56293 24c90a 56292->56293 56294 24c9bb 56292->56294 56782 24cb10 56293->56782 56295 243620 2 API calls 56294->56295 56296 24c9c5 56295->56296 56297 243620 2 API calls 56296->56297 56307 24c9cf 56297->56307 56300 24c98c 56300->56014 56301 24c997 56799 24cbf0 RtlAllocateHeap RaiseException 56301->56799 56302 24c93a WideCharToMultiByte 56302->56301 56304 24c956 56302->56304 56305 24c971 WideCharToMultiByte 56304->56305 56798 24ccb0 46 API calls 56304->56798 56305->56296 56305->56300 56307->56014 56309 2439b0 54 API calls 56308->56309 56310 27ff3f 56309->56310 56311 27fff9 56310->56311 56314 27ff49 56310->56314 56312 243620 2 API calls 56311->56312 56313 280003 56312->56313 56315 2439b0 54 API calls 56313->56315 56350 27ff10 84 API calls 56314->56350 56803 2b150a 56314->56803 56806 2b1528 56314->56806 56809 2b157d 56314->56809 56812 2b151e 56314->56812 56815 2b1573 56314->56815 56818 2b1541 56314->56818 56821 2b1532 56314->56821 56824 2b1550 56314->56824 56827 2b1500 56314->56827 56830 2b1514 56314->56830 56833 2b1587 56314->56833 56836 2b1546 56314->56836 56839 2b1564 56314->56839 56842 2b155a 56314->56842 56317 2800d0 56315->56317 56316 27ff80 56318 27ff89 RegCreateKeyA RegSetValueExA 56316->56318 56323 27ff84 56316->56323 56319 2800da 56317->56319 56320 28017f 56317->56320 56318->56323 56326 24cb10 57 API calls 56319->56326 56321 243620 2 API calls 56320->56321 56322 280189 56321->56322 56324 2439b0 54 API calls 56322->56324 56323->56023 56325 2801c0 56324->56325 56327 243620 2 API calls 56325->56327 56338 2801ca 56325->56338 56328 280104 56326->56328 56329 280286 RegOpenKeyA 56327->56329 56330 280114 56328->56330 56845 25e8c0 46 API calls 56328->56845 56331 2803a3 56329->56331 56334 2802d2 56329->56334 56355 2b150a 17 API calls 56330->56355 56356 2b1528 17 API calls 56330->56356 56357 2b1541 17 API calls 56330->56357 56358 2b1500 17 API calls 56330->56358 56359 2b1587 17 API calls 56330->56359 56360 2b1546 17 API calls 56330->56360 56361 2b1564 17 API calls 56330->56361 56362 2b155a 17 API calls 56330->56362 56363 2b151e 17 API calls 56330->56363 56364 2b157d 17 API calls 56330->56364 56365 27ff10 84 API calls 56330->56365 56366 2b1573 17 API calls 56330->56366 56367 2b1532 17 API calls 56330->56367 56368 2b1550 17 API calls 56330->56368 56369 2b1514 17 API calls 56330->56369 56331->56023 56333 28012f 56335 2b43af 5 API calls 56333->56335 56339 280362 56334->56339 56846 25e8c0 46 API calls 56334->56846 56336 280179 56335->56336 56336->56023 56338->56023 56339->56023 56350->56316 56355->56333 56356->56333 56357->56333 56358->56333 56359->56333 56360->56333 56361->56333 56362->56333 56363->56333 56364->56333 56365->56333 56366->56333 56367->56333 56368->56333 56369->56333 56370->55929 56371->56012 56916 245150 10 API calls 56372->56916 56374 245360 56375 245366 FindResourceW 56374->56375 56376 2453e2 56374->56376 56375->56376 56377 24537d 56375->56377 56376->56011 56917 245210 LoadResource LockResource SizeofResource 56377->56917 56379 245387 56379->56376 56918 2b9d53 44 API calls 56379->56918 56381 2453be 56382 2453ce 56381->56382 56383 243620 2 API calls 56381->56383 56382->56011 56384 2453f4 56383->56384 56386 24568d 56385->56386 56390 245698 56385->56390 56919 245400 56386->56919 56389 243620 2 API calls 56391 24578c 56389->56391 56392 245724 56390->56392 56393 2456e8 56390->56393 56402 245717 56390->56402 56395 24572e 56392->56395 56396 245711 56392->56396 56392->56402 56397 245700 56393->56397 56398 2456f3 56393->56398 56393->56402 56394 24576f 56394->56011 56926 2b9d3e 13 API calls 56395->56926 56396->56402 56927 2b9d3e 13 API calls 56396->56927 56397->56396 56401 245704 56397->56401 56924 2b9d3e 13 API calls 56398->56924 56925 2b9d3e 13 API calls 56401->56925 56402->56389 56402->56394 56403 2456f8 56928 2b989f 44 API calls 56403->56928 56407->56031 56408->56044 56409->56033 56410->56037 56412 2b43b8 IsProcessorFeaturePresent 56411->56412 56413 2b43b7 56411->56413 56415 2b4470 56412->56415 56413->56043 56929 2b4433 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 56415->56929 56417 2b4553 56417->56043 56419->55908 56422 246a06 56421->56422 56424 246a13 56421->56424 56423 242040 46 API calls 56422->56423 56438 246a0e 56423->56438 56425 246b80 56424->56425 56428 246a51 PathIsUNCW 56424->56428 56426 242040 46 API calls 56425->56426 56426->56438 56427 2b43af 5 API calls 56429 246baf 56427->56429 56430 246b3a 56428->56430 56431 246a66 56428->56431 56429->55934 56430->56425 56433 246b64 56430->56433 56431->56425 56432 246a94 56431->56432 56434 242040 46 API calls 56432->56434 56435 242040 46 API calls 56433->56435 56436 246a9d 56434->56436 56435->56436 56930 247280 45 API calls 56436->56930 56438->56427 56440->55959 56443 2b28dd 56442->56443 56444 2b28d6 56442->56444 56446 2b269b 56443->56446 56458 2b405f EnterCriticalSection 56443->56458 56457 2c2368 44 API calls 56444->56457 56446->56080 56455 2b27e7 RaiseException EnterCriticalSection LeaveCriticalSection 56446->56455 56449 2b2929 56448->56449 56450 2c2376 56448->56450 56454 2b293c 56449->56454 56459 2b406d LeaveCriticalSection 56449->56459 56460 2c2351 LeaveCriticalSection 56450->56460 56453 2c237d 56453->56085 56454->56085 56455->56083 56456->56080 56457->56446 56458->56446 56459->56454 56460->56453 56461->56100 56463 2b28c7 45 API calls 56462->56463 56464 249300 56463->56464 56465 249381 56464->56465 56466 24935c 56464->56466 56480 2b2387 45 API calls 56465->56480 56475 2b2782 56466->56475 56470 24938b 56481 2c2279 56475->56481 56480->56470 56486 2c75e7 56481->56486 56507 2c6f35 44 API calls 56486->56507 56488 2c75ec 56508 2c6f5f 44 API calls 56488->56508 56490 2c75f1 56509 2c6f8a 44 API calls 56490->56509 56492 2c75f6 56510 2c6fb5 44 API calls 56492->56510 56494 2c75fb 56511 2c6fe0 44 API calls 56494->56511 56496 2c7600 56512 2c700b 44 API calls 56496->56512 56498 2c7605 56513 2c7036 44 API calls 56498->56513 56500 2c760a 56514 2c7061 44 API calls 56500->56514 56502 2c760f 56515 2c70b7 44 API calls 56502->56515 56504 2c7614 56516 2c708c 44 API calls 56504->56516 56506 2c7619 56506->56506 56507->56488 56508->56490 56509->56492 56510->56494 56511->56496 56512->56498 56513->56500 56514->56502 56515->56504 56516->56506 56517->56125 56518->56127 56519->56129 56520->56131 56522 2b43d4 3 API calls 56521->56522 56523 24d01a 56522->56523 56524 24dd40 56523->56524 56552 24ed00 56524->56552 56527 24dd9c 56530 2b43d4 3 API calls 56527->56530 56528 24d024 56528->56139 56528->56140 56529 24f270 3 API calls 56531 24dd94 56529->56531 56532 24ddab 56530->56532 56533 24dfd0 3 API calls 56531->56533 56534 2b43d4 3 API calls 56532->56534 56533->56527 56535 24de19 56534->56535 56535->56528 56536 24ed00 45 API calls 56535->56536 56537 24f270 3 API calls 56535->56537 56538 2b43d4 3 API calls 56535->56538 56539 24dfd0 3 API calls 56535->56539 56536->56535 56537->56535 56538->56535 56539->56535 56541 24e003 56540->56541 56542 2b43d4 3 API calls 56541->56542 56543 24d035 56542->56543 56544 24f270 56543->56544 56545 2b43d4 3 API calls 56544->56545 56546 24f29d 56545->56546 56546->56146 56548 25467b 56547->56548 56549 25469b 56547->56549 56548->56547 56548->56549 56579 2b98af 44 API calls 56548->56579 56549->56148 56553 24dd7b 56552->56553 56569 24ed15 56552->56569 56553->56527 56553->56528 56553->56529 56554 24f253 56576 24dae0 45 API calls 56554->56576 56556 24f25a 56577 24dae0 45 API calls 56556->56577 56559 24f261 56578 24dae0 45 API calls 56559->56578 56560 24f270 RaiseException EnterCriticalSection LeaveCriticalSection 56560->56569 56563 24f24c 56575 24dae0 45 API calls 56563->56575 56569->56553 56569->56554 56569->56556 56569->56559 56569->56560 56569->56563 56570 2501b0 45 API calls 56569->56570 56571 2500d0 45 API calls 56569->56571 56572 250340 45 API calls 56569->56572 56573 250740 45 API calls 56569->56573 56574 250510 45 API calls 56569->56574 56570->56569 56571->56569 56572->56569 56573->56569 56574->56569 56580->56153 56581->56156 56582->56167 56583->56167 56584->56167 56585->56155 56586->56159 56587->56161 56588->56169 56590 25e4d7 56589->56590 56591 25e36a 56589->56591 56592 243620 2 API calls 56590->56592 56594 25e3bc 56591->56594 56596 25e38c 56591->56596 56593 25e4e1 56592->56593 56652 2455b0 46 API calls 56593->56652 56597 2439b0 54 API calls 56594->56597 56620 25e3e1 56594->56620 56633 246070 56596->56633 56597->56620 56598 25e4e6 56600 243620 2 API calls 56598->56600 56602 25e4f0 56600->56602 56601 25e394 56601->56175 56603 25e711 56602->56603 56604 25e53e 56602->56604 56606 243620 2 API calls 56603->56606 56605 25e5a8 56604->56605 56607 25e54b 56604->56607 56608 25e690 56605->56608 56609 25e5b3 56605->56609 56616 25e6bb 56606->56616 56607->56608 56618 25e580 56607->56618 56613 2439b0 54 API calls 56608->56613 56622 25e6d4 56608->56622 56614 2439b0 54 API calls 56609->56614 56619 25e5d8 56609->56619 56610 243620 2 API calls 56612 25e725 56610->56612 56611 25e4cd 56615 243620 2 API calls 56611->56615 56613->56616 56617 25e5e6 56614->56617 56615->56590 56616->56610 56616->56622 56617->56616 56617->56619 56621 25e310 65 API calls 56618->56621 56627 25e63d 56619->56627 56630 25e64a 56619->56630 56620->56593 56620->56598 56620->56611 56625 25e460 56620->56625 56632 25e5a3 56621->56632 56622->56175 56624 25e47c 56624->56175 56625->56624 56650 2b9d3e 13 API calls 56625->56650 56626 25e49e 56651 2b989f 44 API calls 56626->56651 56629 245350 55 API calls 56627->56629 56629->56632 56630->56630 56631 245680 46 API calls 56630->56631 56631->56632 56632->56175 56635 246084 56633->56635 56634 246097 56634->56601 56635->56634 56636 246143 56635->56636 56644 2460c1 56635->56644 56657 2455b0 46 API calls 56636->56657 56637 246106 56637->56601 56639 2460e7 56653 2b9d3e 13 API calls 56639->56653 56640 246148 56642 2460ec 56654 2b989f 44 API calls 56642->56654 56644->56637 56644->56639 56646 246128 56644->56646 56645 2460f7 56645->56601 56646->56637 56655 2b9d3e 13 API calls 56646->56655 56648 246131 56656 2b989f 44 API calls 56648->56656 56650->56626 56651->56624 56652->56598 56653->56642 56654->56645 56655->56648 56656->56637 56657->56640 56663 242066 56661->56663 56662 242121 56712 243ea0 45 API calls 56662->56712 56663->56662 56667 24211c 56663->56667 56670 2420b5 56663->56670 56671 2420f0 56663->56671 56674 24207b 56663->56674 56665 2420c2 56665->56674 56713 2b98af 44 API calls 56665->56713 56711 2442d0 RaiseException 56667->56711 56670->56667 56676 2420bc 56670->56676 56675 2b43d4 3 API calls 56671->56675 56674->56195 56675->56674 56677 2b43d4 3 API calls 56676->56677 56677->56665 56679 246d39 56678->56679 56680 246d44 56679->56680 56686 246e3c 56679->56686 56681 246d61 56680->56681 56682 246f7e 56680->56682 56684 243c00 46 API calls 56681->56684 56714 242440 45 API calls 56682->56714 56693 246d85 56684->56693 56685 246f83 56715 2b98af 44 API calls 56685->56715 56688 246e93 56686->56688 56689 246f88 56686->56689 56702 246e26 56686->56702 56694 243c00 46 API calls 56688->56694 56716 242440 45 API calls 56689->56716 56690 2b43af 5 API calls 56691 246c1d 56690->56691 56703 246f90 56691->56703 56696 246db4 56693->56696 56698 2443b0 44 API calls 56693->56698 56697 246eb7 56694->56697 56695 246f8d 56700 2443b0 44 API calls 56696->56700 56699 2443b0 44 API calls 56697->56699 56698->56696 56699->56702 56701 246de4 56700->56701 56701->56685 56701->56702 56702->56690 56709 24700c 56703->56709 56704 24722b 56704->56199 56706 247279 56718 242440 45 API calls 56706->56718 56708 24727e 56709->56704 56709->56706 56717 2b98af 44 API calls 56709->56717 56710->56201 56714->56685 56716->56695 56718->56708 56720->56216 56722 2b625c RaiseException 56721->56722 56723 2b622f 56721->56723 56722->56221 56723->56722 56724->56228 56725->56233 56726->56227 56727->56231 56728->56236 56730->56245 56737 2b49c5 56734->56737 56738 2b4970 56737->56738 56739 2b43d4 3 API calls 56738->56739 56740 2647bd GetTokenInformation 56739->56740 56740->56258 56740->56261 56742 26643f 56741->56742 56743 266459 56742->56743 56745 26644c 56742->56745 56744 2439b0 54 API calls 56743->56744 56747 26645e 56744->56747 56746 25e310 65 API calls 56745->56746 56748 266457 56746->56748 56747->56748 56749 243620 2 API calls 56747->56749 56748->56277 56750 2664a6 56749->56750 56751 2664ee 56750->56751 56754 266511 56750->56754 56752 2439b0 54 API calls 56751->56752 56753 2664f3 56752->56753 56755 243620 2 API calls 56753->56755 56758 2664f9 56753->56758 56757 25e310 65 API calls 56754->56757 56756 266572 56755->56756 56759 246070 46 API calls 56756->56759 56757->56758 56758->56277 56760 2665c3 56759->56760 56761 245060 46 API calls 56760->56761 56762 2665e7 56761->56762 56778 241c90 56 API calls 56762->56778 56764 2665ef 56779 263b60 71 API calls 56764->56779 56766 26671a 56781 241d60 FindClose 56766->56781 56769 2b43af 5 API calls 56772 266769 56769->56772 56770 266726 56770->56769 56771 2666a2 GetFileAttributesW 56773 2666af SetFileAttributesW 56771->56773 56774 266674 56771->56774 56772->56277 56773->56774 56775 2665ff 56774->56775 56776 26667e GetFileAttributesW 56774->56776 56775->56766 56775->56771 56775->56774 56780 264020 66 API calls 56775->56780 56776->56774 56777 26668b SetFileAttributesW 56776->56777 56777->56774 56778->56764 56779->56775 56780->56775 56781->56770 56783 24cb24 56782->56783 56784 24c932 56782->56784 56783->56784 56800 245150 10 API calls 56783->56800 56784->56300 56784->56301 56784->56302 56786 24cb39 56786->56784 56787 24cb43 FindResourceW 56786->56787 56787->56784 56788 24cb57 56787->56788 56801 245210 LoadResource LockResource SizeofResource 56788->56801 56790 24cb61 56790->56784 56791 24cb6a WideCharToMultiByte 56790->56791 56792 24cbd6 56791->56792 56793 24cb8a 56791->56793 56795 243620 2 API calls 56792->56795 56794 24cba5 WideCharToMultiByte 56793->56794 56802 24ccb0 46 API calls 56793->56802 56794->56784 56794->56792 56797 24cbe0 56795->56797 56798->56305 56799->56300 56800->56786 56801->56790 56802->56794 56804 2b14ef 56803->56804 56847 2b1934 56804->56847 56807 2b14ef 56806->56807 56807->56806 56808 2b1934 17 API calls 56807->56808 56808->56807 56810 2b14ef 56809->56810 56811 2b1934 17 API calls 56810->56811 56811->56810 56814 2b14ef 56812->56814 56813 2b1934 17 API calls 56813->56814 56814->56813 56817 2b14ef 56815->56817 56816 2b1934 17 API calls 56816->56817 56817->56816 56819 2b14ef 56818->56819 56820 2b1934 17 API calls 56819->56820 56820->56819 56822 2b14ef 56821->56822 56823 2b1934 17 API calls 56822->56823 56823->56822 56825 2b14ef 56824->56825 56826 2b1934 17 API calls 56825->56826 56826->56825 56829 2b14ef 56827->56829 56828 2b1934 17 API calls 56828->56829 56829->56828 56831 2b14ef 56830->56831 56832 2b1934 17 API calls 56831->56832 56832->56831 56834 2b14ef 56833->56834 56835 2b1934 17 API calls 56834->56835 56835->56834 56837 2b14ef 56836->56837 56838 2b1934 17 API calls 56837->56838 56838->56837 56840 2b14ef 56839->56840 56841 2b1934 17 API calls 56840->56841 56841->56840 56844 2b14ef 56842->56844 56843 2b1934 17 API calls 56843->56844 56844->56843 56845->56330 56846->56339 56875 2b1608 56847->56875 56849 2b1944 56850 2b19a1 56849->56850 56851 2b19c5 56849->56851 56897 2b1894 8 API calls 56850->56897 56854 2b1a3d LoadLibraryExA 56851->56854 56855 2b1a9e 56851->56855 56859 2b1ab0 56851->56859 56866 2b1b79 56851->56866 56853 2b19ac RaiseException 56871 2b1ba2 56853->56871 56854->56855 56856 2b1a50 GetLastError 56854->56856 56858 2b1aa9 FreeLibrary 56855->56858 56855->56859 56860 2b1a79 56856->56860 56861 2b1a63 56856->56861 56857 2b1b6c 56887 2b15aa 56857->56887 56858->56859 56859->56857 56862 2b1b0e GetProcAddress 56859->56862 56898 2b1894 8 API calls 56860->56898 56861->56855 56861->56860 56862->56857 56864 2b1b1e GetLastError 56862->56864 56867 2b1b31 56864->56867 56900 2b1894 8 API calls 56866->56900 56867->56857 56899 2b1894 8 API calls 56867->56899 56868 2b1a84 RaiseException 56868->56871 56871->56804 56872 2b1b52 RaiseException 56873 2b1608 8 API calls 56872->56873 56874 2b1b69 56873->56874 56874->56857 56876 2b1647 56875->56876 56877 2b1614 56875->56877 56876->56849 56877->56876 56901 2b16be 56877->56901 56879 2b1622 56880 2b1642 56879->56880 56881 2b1632 56879->56881 56912 2b1648 GetModuleHandleW GetProcAddress GetProcAddress 56880->56912 56906 2b17ec 56881->56906 56884 2b18dc 56885 2b18f8 56884->56885 56886 2b18f4 ReleaseSRWLockExclusive 56884->56886 56885->56849 56886->56849 56888 2b15bc 56887->56888 56896 2b15fa 56887->56896 56889 2b16be 4 API calls 56888->56889 56888->56896 56890 2b15ca 56889->56890 56891 2b17ec 3 API calls 56890->56891 56892 2b15db 56891->56892 56893 2b17ec 3 API calls 56892->56893 56894 2b15f5 56893->56894 56915 2b18d7 GetModuleHandleW GetProcAddress GetProcAddress ReleaseSRWLockExclusive 56894->56915 56896->56866 56897->56853 56898->56868 56899->56872 56900->56871 56913 2b1648 GetModuleHandleW GetProcAddress GetProcAddress 56901->56913 56903 2b16c3 56904 2b16db AcquireSRWLockExclusive 56903->56904 56905 2b16df 56903->56905 56904->56879 56905->56879 56907 2b1801 56906->56907 56908 2b1807 56907->56908 56911 2b183c 56907->56911 56914 2b16fd VirtualQuery GetSystemInfo 56907->56914 56908->56880 56910 2b1876 VirtualProtect 56910->56908 56911->56910 56912->56884 56913->56903 56914->56911 56915->56896 56916->56374 56917->56379 56918->56381 56920 245438 56919->56920 56921 245447 56919->56921 56920->56921 56922 243620 2 API calls 56920->56922 56921->56011 56923 2454bc 56922->56923 56924->56403 56925->56403 56926->56403 56927->56403 56928->56402 56929->56417 56932 2b46c3 56931->56932 56933 2b46c8 ReleaseSRWLockExclusive 56932->56933 56940 2b46fe SleepConditionVariableSRW 56932->56940 56933->56051 56936->56056 56937->56049 56938->56057 56939->56060 56940->56932 56941->56068 56942->56066 56943 243850 56944 24385c 56943->56944 56945 2438a2 56943->56945 56944->56945 56946 243620 2 API calls 56944->56946 56946->56945 56947 241690 56952 248970 56947->56952 56951 2416ad 56955 2489a7 56952->56955 56967 24a4e0 56955->56967 56956 2b43d4 3 API calls 56957 248a3e 56956->56957 56958 2b2684 49 API calls 56957->56958 56959 248a47 56958->56959 56960 248d00 74 API calls 56959->56960 56962 248a88 56960->56962 56961 248af7 56964 2416a3 56961->56964 56976 2b2a32 46 API calls 56961->56976 56962->56961 56963 24a4e0 45 API calls 56962->56963 56963->56961 56966 2b494f 47 API calls 56964->56966 56966->56951 56968 248a37 56967->56968 56969 24a4fa 56967->56969 56968->56956 56970 24a512 56969->56970 56971 2b6215 RaiseException 56969->56971 56977 249dc0 44 API calls 56970->56977 56971->56970 56973 24a548 56974 2b6215 RaiseException 56973->56974 56975 24a557 56974->56975 56976->56964 56977->56973 56978 25afd0 CoInitializeEx 56979 25b00e 56978->56979 56980 25b05a 56978->56980 57049 258780 306 API calls 56979->57049 56989 255ab0 56980->56989 56984 25b027 57050 2b3148 56 API calls 56984->57050 56988 25b030 56994 255ac3 56989->56994 56990 255b02 56991 255b29 56990->56991 57051 255560 70 API calls 56990->57051 56993 255b50 56991->56993 57052 255630 70 API calls 56991->57052 56997 255b77 56993->56997 57053 255690 70 API calls 56993->57053 56994->56990 56998 2b6215 RaiseException 56994->56998 56995 255b1a 56999 2b6215 RaiseException 56995->56999 57002 255b9e 56997->57002 57054 2556f0 70 API calls 56997->57054 56998->56990 56999->56991 57000 255b41 57005 2b6215 RaiseException 57000->57005 57004 255bc5 57002->57004 57055 255750 70 API calls 57002->57055 57009 255bec 57004->57009 57056 2557b0 70 API calls 57004->57056 57005->56993 57006 255b68 57010 2b6215 RaiseException 57006->57010 57007 255b8f 57011 2b6215 RaiseException 57007->57011 57014 255c13 57009->57014 57057 255810 70 API calls 57009->57057 57010->56997 57011->57002 57012 255bb6 57016 2b6215 RaiseException 57012->57016 57015 255c3a 57014->57015 57058 255870 70 API calls 57014->57058 57021 255c61 57015->57021 57059 2558d0 70 API calls 57015->57059 57016->57004 57017 255bdd 57022 2b6215 RaiseException 57017->57022 57019 255c04 57023 2b6215 RaiseException 57019->57023 57026 255c88 57021->57026 57060 255930 70 API calls 57021->57060 57022->57009 57023->57014 57024 255c2b 57027 2b6215 RaiseException 57024->57027 57032 255caf 57026->57032 57061 255990 70 API calls 57026->57061 57027->57015 57028 255c52 57033 2b6215 RaiseException 57028->57033 57031 255cd6 57038 255cfd 57031->57038 57063 255a50 70 API calls 57031->57063 57032->57031 57062 2559f0 70 API calls 57032->57062 57033->57021 57034 255c79 57035 2b6215 RaiseException 57034->57035 57035->57026 57036 255ca0 57040 2b6215 RaiseException 57036->57040 57064 255100 70 API calls 57038->57064 57040->57032 57041 255cc7 57044 2b6215 RaiseException 57041->57044 57043 255d0f 57046 2b6215 RaiseException 57043->57046 57044->57031 57045 255cee 57047 2b6215 RaiseException 57045->57047 57048 255d1e 57046->57048 57047->57038 57049->56984 57050->56988 57051->56995 57052->57000 57053->57006 57054->57007 57055->57012 57056->57017 57057->57019 57058->57024 57059->57028 57060->57034 57061->57036 57062->57041 57063->57045 57064->57043 57065 27bb30 57066 27bbaf 57065->57066 57072 27b780 57066->57072 57087 283fd0 57066->57087 57067 27bbb3 57068 27bc05 SetWindowLongW 57067->57068 57069 27bbeb 57067->57069 57068->57069 57073 27b837 57072->57073 57074 27b794 57072->57074 57073->57067 57075 27b7d6 57074->57075 57076 27b79e 57074->57076 57078 27b80d 57075->57078 57079 27b7dd 57075->57079 57110 28ca00 57076->57110 57078->57073 57081 27b814 DestroyWindow 57078->57081 57079->57073 57080 27b7e8 EnableWindow 57079->57080 57080->57067 57081->57067 57082 27b7ad 57115 27ba50 6 API calls 57082->57115 57088 284142 57087->57088 57089 284004 57087->57089 57088->57067 57090 284100 57089->57090 57091 284012 57089->57091 57090->57088 57094 284112 EndDialog 57090->57094 57092 28ca00 8 API calls 57091->57092 57093 284021 57092->57093 57095 27bea0 18 API calls 57093->57095 57094->57067 57096 284029 SetWindowTextW 57095->57096 57097 2439b0 54 API calls 57096->57097 57098 28403c 57097->57098 57099 284189 57098->57099 57100 284047 57098->57100 57101 243620 2 API calls 57099->57101 57105 245350 55 API calls 57100->57105 57102 284193 57101->57102 57150 2841c0 57102->57150 57104 2841a8 57104->57067 57106 284073 GetDlgItem SetWindowTextW 57105->57106 57144 294d20 57106->57144 57109 2840ca 57109->57067 57137 2698c0 LoadLibraryW 57110->57137 57113 2698c0 6 API calls 57114 28ca30 SendMessageW SendMessageW 57113->57114 57114->57082 57116 27bad4 57115->57116 57117 27badb SetWindowPos 57115->57117 57116->57117 57118 2b43af 5 API calls 57117->57118 57119 27b7b7 57118->57119 57120 27bea0 GetWindowLongW 57119->57120 57121 27bf02 GetWindow 57120->57121 57122 27bef9 GetParent 57120->57122 57123 27bf0b GetWindowRect 57121->57123 57122->57123 57124 27bf1f 57123->57124 57125 27bf89 GetParent GetClientRect GetClientRect MapWindowPoints 57123->57125 57126 27bf23 GetWindowLongW 57124->57126 57127 27bf38 MonitorFromWindow 57124->57127 57130 27bf6a SetWindowPos 57125->57130 57126->57127 57131 27bf82 57127->57131 57132 27bf48 GetMonitorInfoW 57127->57132 57130->57131 57134 2b43af 5 API calls 57131->57134 57132->57131 57133 27bf5e 57132->57133 57133->57130 57135 27bf75 GetWindowRect 57133->57135 57136 27b7c0 57134->57136 57135->57130 57136->57067 57138 269950 GetSystemMetrics GetSystemMetrics LoadImageW 57137->57138 57139 26991a GetProcAddress 57137->57139 57140 26994b 57138->57140 57139->57138 57141 26992c 57139->57141 57142 2699b6 57140->57142 57143 2699a8 FreeLibrary 57140->57143 57141->57138 57141->57140 57142->57113 57143->57142 57145 294d30 GetWindowLongW 57144->57145 57146 294d4b GetWindow 57145->57146 57147 294d42 GetParent 57145->57147 57148 294d54 57146->57148 57147->57148 57148->57145 57149 284097 CreateThread 57148->57149 57149->57109 57156 2844a0 CoInitialize 57149->57156 57151 284208 CloseHandle 57150->57151 57153 28420f 57150->57153 57151->57153 57152 28427a 57152->57104 57153->57152 57155 2b1fd6 10 API calls 57153->57155 57155->57152 57161 282c00 57156->57161 57159 2844f8 57160 2844f2 CoUninitialize 57160->57159 57168 280f80 57161->57168 57167 282c65 57167->57159 57167->57160 57184 280fc7 57168->57184 57169 2810b1 57170 2439b0 54 API calls 57169->57170 57176 2810b6 57170->57176 57171 281a03 57172 243620 2 API calls 57171->57172 57174 281a0d 57172->57174 57173 2819f9 57175 243620 2 API calls 57173->57175 57175->57171 57176->57171 57217 281121 57176->57217 57234 274d90 56 API calls 57176->57234 57177 2439b0 54 API calls 57177->57184 57179 2810fa 57180 28114f 57179->57180 57183 28111c 57179->57183 57179->57217 57181 245680 46 API calls 57180->57181 57181->57217 57182 2b43af 5 API calls 57186 28186a 57182->57186 57187 246070 46 API calls 57183->57187 57184->57169 57184->57171 57184->57173 57184->57177 57233 283550 56 API calls 57184->57233 57186->57167 57225 281eb0 57186->57225 57187->57217 57189 281870 57190 2439b0 54 API calls 57189->57190 57212 281820 57189->57212 57191 28187e 57190->57191 57191->57171 57194 281888 57191->57194 57192 2814b9 CreateFileW 57196 2814e9 CloseHandle 57192->57196 57197 2814ff GetFileSize 57192->57197 57193 245060 46 API calls 57193->57217 57207 245060 46 API calls 57194->57207 57218 2813a2 57196->57218 57199 281519 CloseHandle 57197->57199 57197->57218 57199->57218 57200 2818f7 57202 28190b DeleteFileW 57200->57202 57203 2818f4 57200->57203 57205 28191d 57202->57205 57216 2818c0 57202->57216 57203->57200 57244 2454d0 46 API calls 57203->57244 57208 2439b0 54 API calls 57205->57208 57206 2439b0 54 API calls 57206->57217 57209 2818b2 57207->57209 57210 281922 57208->57210 57243 26a750 147 API calls 57209->57243 57210->57171 57214 28192c 57210->57214 57212->57182 57220 245060 46 API calls 57214->57220 57216->57212 57217->57171 57217->57173 57217->57189 57217->57192 57217->57193 57217->57206 57217->57212 57217->57218 57219 2454d0 46 API calls 57217->57219 57235 259d40 57217->57235 57238 2837e0 155 API calls 57217->57238 57239 25e160 46 API calls 57217->57239 57241 269710 70 API calls 57217->57241 57242 275350 46 API calls 57217->57242 57218->57200 57218->57203 57218->57217 57221 245060 46 API calls 57218->57221 57223 26a750 147 API calls 57218->57223 57240 28ef90 12 API calls 57218->57240 57219->57217 57222 281956 57220->57222 57221->57218 57245 26a750 147 API calls 57222->57245 57223->57218 57226 281ef5 57225->57226 57227 2439b0 54 API calls 57226->57227 57228 281efa 57227->57228 57229 243620 2 API calls 57228->57229 57230 282301 57229->57230 57231 243620 2 API calls 57230->57231 57232 28230b 57231->57232 57233->57184 57234->57179 57246 25a4e0 57235->57246 57238->57217 57239->57217 57240->57218 57241->57217 57242->57217 57243->57216 57244->57202 57245->57216 57247 25a518 57246->57247 57262 25a630 57246->57262 57264 2beefb 57247->57264 57248 243620 2 API calls 57249 25a68e 57248->57249 57250 243620 2 API calls 57249->57250 57252 25a698 57250->57252 57253 2439b0 54 API calls 57255 25a577 57253->57255 57255->57249 57256 25a5bf 57255->57256 57258 25a5cd 57255->57258 57257 245350 55 API calls 57256->57257 57260 25a5cb 57257->57260 57258->57258 57259 245680 46 API calls 57258->57259 57259->57260 57270 2bef3c 57260->57270 57262->57248 57263 259d53 57262->57263 57263->57217 57265 2bef0f 57264->57265 57276 2bad7d 57265->57276 57271 2bef50 57270->57271 57298 2baf9f 57271->57298 57274 2b95db 44 API calls 57275 2bef78 57274->57275 57275->57262 57277 2bada9 57276->57277 57278 2badcc 57276->57278 57293 2b9822 44 API calls 57277->57293 57278->57277 57282 2badd4 57278->57282 57280 2badc1 57281 2b43af 5 API calls 57280->57281 57283 2baefe 57281->57283 57294 2bd5ad 48 API calls 57282->57294 57287 2b95db 57283->57287 57285 2bae55 57295 2bcaaf 13 API calls 57285->57295 57288 2b95e7 57287->57288 57289 2b95fe 57288->57289 57296 2b9686 44 API calls 57288->57296 57291 25a538 57289->57291 57297 2b9686 44 API calls 57289->57297 57291->57249 57291->57253 57291->57255 57293->57280 57294->57285 57295->57280 57296->57289 57297->57291 57299 2bafab 57298->57299 57300 2bafce 57298->57300 57306 2b9822 44 API calls 57299->57306 57302 2baff5 57300->57302 57307 2baa86 48 API calls 57300->57307 57304 2bafc6 57302->57304 57308 2b9822 44 API calls 57302->57308 57304->57274 57306->57304 57307->57302 57308->57304 57309 284290 GetDlgItem SendMessageW SendMessageW 57310 28d160 57311 2439b0 54 API calls 57310->57311 57316 28d20d 57311->57316 57312 28d3b8 57313 243620 2 API calls 57312->57313 57314 28d3c2 57313->57314 57329 28d4c0 IsWindow 57314->57329 57316->57312 57318 2439b0 54 API calls 57316->57318 57317 28d3d8 57319 28d23d 57318->57319 57319->57312 57320 2439b0 54 API calls 57319->57320 57321 28d2b6 57320->57321 57321->57312 57322 2439b0 54 API calls 57321->57322 57323 28d33a 57322->57323 57323->57312 57324 2439b0 54 API calls 57323->57324 57325 28d36c 57324->57325 57325->57312 57326 28d372 57325->57326 57336 294b00 57326->57336 57330 28d51c EndDialog 57329->57330 57331 28d527 57329->57331 57330->57331 57345 28d400 10 API calls 57331->57345 57333 28d688 57333->57317 57334 28d5f5 57334->57333 57346 2b1fd6 10 API calls 57334->57346 57347 26ea80 57336->57347 57339 28d39b 57340 2b46af 3 API calls 57343 294b7f 57340->57343 57341 294c58 CoCreateInstance 57341->57339 57342 294c0e 57342->57339 57342->57341 57343->57342 57355 2b465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57343->57355 57345->57334 57346->57333 57348 26eabb 57347->57348 57354 26eb5f 57347->57354 57349 2b46af 3 API calls 57348->57349 57350 26eac5 57349->57350 57350->57354 57356 26eb80 57350->57356 57354->57340 57354->57342 57355->57342 57357 26ebd8 RegOpenKeyExW 57356->57357 57359 26ec06 RegQueryValueExW RegQueryValueExW 57357->57359 57360 26eede 57357->57360 57361 26eccb RegQueryValueExW 57359->57361 57362 26ec6b RegQueryValueExW 57359->57362 57363 26ef0a 57360->57363 57364 26eef9 RegCloseKey 57360->57364 57367 26ed12 57361->57367 57362->57361 57365 26eca3 57362->57365 57366 2b43af 5 API calls 57363->57366 57364->57363 57365->57361 57365->57365 57368 26eb4e 57366->57368 57369 26ed57 RegQueryValueExW 57367->57369 57384 2b465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57368->57384 57370 26edac RegQueryValueExW 57369->57370 57371 26ed88 57369->57371 57373 26eddd 57370->57373 57371->57370 57372 26ee96 57374 26eed2 57372->57374 57375 26eea0 GetCurrentProcess 57372->57375 57373->57372 57376 2b46af 3 API calls 57373->57376 57385 26ef30 57374->57385 57378 26eec0 IsWow64Process 57375->57378 57377 26ee59 57376->57377 57377->57372 57380 26ee65 GetModuleHandleW GetProcAddress 57377->57380 57378->57374 57381 26eec6 57378->57381 57396 2b465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57380->57396 57381->57374 57383 26ee93 57383->57372 57384->57354 57386 26ef8a RegOpenKeyExW 57385->57386 57388 26efb8 RegQueryValueExW 57386->57388 57392 26f06c 57386->57392 57391 26f037 RegQueryValueExW 57388->57391 57395 26efe9 57388->57395 57389 26f24e 57393 2b43af 5 API calls 57389->57393 57390 26f23d RegCloseKey 57390->57389 57391->57392 57392->57389 57392->57390 57394 26f266 57393->57394 57394->57360 57395->57391 57396->57383 57397 280631 57428 2b56f0 57397->57428 57400 264890 3 API calls 57401 2806d9 RegEnumValueA 57400->57401 57402 2439b0 54 API calls 57401->57402 57405 280703 57402->57405 57403 28083d 57404 243620 2 API calls 57403->57404 57409 280847 57404->57409 57405->57403 57430 25e8c0 46 API calls 57405->57430 57407 280733 57408 2439b0 54 API calls 57407->57408 57410 28073c 57408->57410 57419 2808f0 57409->57419 57420 2809b5 57409->57420 57427 2808f8 57409->57427 57410->57403 57411 280747 57410->57411 57412 24cb10 57 API calls 57411->57412 57413 28076f 57412->57413 57414 28077f 57413->57414 57431 25e8c0 46 API calls 57413->57431 57432 279b90 57414->57432 57417 28078e 57418 279b90 46 API calls 57417->57418 57424 28079e 57418->57424 57445 2bff49 44 API calls 57419->57445 57421 243620 2 API calls 57420->57421 57423 2809bf 57421->57423 57425 2b43af 5 API calls 57424->57425 57426 280833 57425->57426 57429 280652 RegEnumValueA 57428->57429 57429->57400 57430->57407 57431->57414 57434 279bd6 57432->57434 57433 279be9 57433->57417 57434->57433 57435 279c16 57434->57435 57436 279c9f 57434->57436 57435->57433 57439 279c2f 57435->57439 57442 279c66 57435->57442 57449 2455b0 46 API calls 57436->57449 57438 279ca4 57446 2b9d3e 13 API calls 57439->57446 57441 279c34 57448 2b989f 44 API calls 57441->57448 57442->57433 57447 2b9d3e 13 API calls 57442->57447 57445->57427 57446->57441 57447->57441 57448->57433 57449->57438 57450 2842f1 57451 28430a 57450->57451 57452 284339 57451->57452 57453 28432a EndDialog 57451->57453 57460 280d00 230 API calls 57452->57460 57455 28433f 57461 282df0 46 API calls 57455->57461 57457 284347 57458 28434f EndDialog 57457->57458 57459 284361 EndDialog 57457->57459 57458->57459 57460->57455 57461->57457 57462 2b4bd2 57463 2b4bde 57462->57463 57488 2b4789 57463->57488 57465 2b4be5 57466 2b4d38 57465->57466 57477 2b4c0f 57465->57477 57522 2b5342 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 57466->57522 57468 2b4d3f 57515 2c42bc 57468->57515 57472 2b4d4d 57473 2b4c2e 57474 2b4caf 57499 2b5457 GetStartupInfoW 57474->57499 57476 2b4cb5 57500 25f680 CoInitialize DefWindowProcW 57476->57500 57477->57473 57477->57474 57518 2bf99b 44 API calls 57477->57518 57482 2b4cd1 57482->57468 57483 2b4cd5 57482->57483 57484 2b4cde 57483->57484 57520 2c4271 44 API calls 57483->57520 57521 2b48fa 80 API calls 57484->57521 57487 2b4ce6 57487->57473 57489 2b4792 57488->57489 57524 2b4e00 IsProcessorFeaturePresent 57489->57524 57491 2b479e 57525 2b82c8 10 API calls 57491->57525 57493 2b47a3 57498 2b47a7 57493->57498 57526 2c4cae 57493->57526 57496 2b47be 57496->57465 57498->57465 57499->57476 57535 25f980 57500->57535 57506 25f6f4 57658 25b3e0 57506->57658 57511 25f715 CoUninitialize 57512 25f71b 57511->57512 57513 2b43af 5 API calls 57512->57513 57514 25f736 57513->57514 57519 2b548d GetModuleHandleW 57514->57519 59385 2c40e5 57515->59385 57518->57474 57519->57482 57520->57484 57521->57487 57522->57468 57523 2c4280 44 API calls 57523->57472 57524->57491 57525->57493 57530 2cd8b6 57526->57530 57529 2b82e7 7 API calls 57529->57498 57531 2cd8c6 57530->57531 57532 2b47b0 57530->57532 57531->57532 57534 2c7620 VirtualProtect 57531->57534 57532->57496 57532->57529 57534->57531 57536 25f9e5 GetCurrentThreadId 57535->57536 57538 25f9c4 57535->57538 57537 2b43d4 3 API calls 57536->57537 57539 25f6e0 57537->57539 57538->57536 57540 25b0c0 57539->57540 57677 276010 57540->57677 57545 2439b0 54 API calls 57548 25b165 57545->57548 57546 243620 2 API calls 57547 25b28c 57546->57547 57549 2439b0 54 API calls 57548->57549 57556 25b247 57548->57556 57550 25b1a9 57549->57550 57551 2439b0 54 API calls 57550->57551 57550->57556 57552 25b1df 57551->57552 57553 2439b0 54 API calls 57552->57553 57552->57556 57554 25b215 57553->57554 57555 2439b0 54 API calls 57554->57555 57554->57556 57555->57556 57556->57546 57557 25b24d 57556->57557 57558 25b5a0 57557->57558 57821 25c420 GetModuleFileNameW 57558->57821 57560 25b5ea 57561 24c850 46 API calls 57560->57561 57562 25b600 57561->57562 57563 266400 77 API calls 57562->57563 57564 25b63b 57563->57564 57565 24c850 46 API calls 57564->57565 57566 25b654 57565->57566 57567 24c850 46 API calls 57566->57567 57568 25b697 57567->57568 57852 25c540 57568->57852 57571 245060 46 API calls 57572 25b6bb 57571->57572 57573 245060 46 API calls 57572->57573 57574 25b6f9 57573->57574 57575 25b85b 57574->57575 57576 25b75e CreateFileW 57574->57576 57657 25b71b 57574->57657 57887 273230 57575->57887 57580 25b79d SetFilePointer 57576->57580 57582 25b78c 57576->57582 57577 25bcd9 57583 2b43af 5 API calls 57577->57583 57578 25bccb FindClose 57578->57577 57581 25b7c2 57580->57581 57580->57582 57867 2677d0 57581->57867 57582->57575 57585 25b84e CloseHandle 57582->57585 57587 25bcf6 57583->57587 57585->57575 57587->57506 57589 25b7d1 57591 25b7ec ReadFile 57589->57591 58284 2454d0 46 API calls 57589->58284 57590 25b87d 57956 25d680 57590->57956 57591->57582 57594 25b7ff 57591->57594 57594->57582 58285 27f480 68 API calls 57594->58285 57595 25b88b 57987 25dae0 57595->57987 57596 25b7e9 57596->57591 57601 25b8a3 57602 25b8dc 57601->57602 57603 246070 46 API calls 57601->57603 58058 273b20 57602->58058 57604 25b8b2 57603->57604 57604->57602 58286 26a540 72 API calls 57604->58286 57607 25b91d 57608 25b935 57607->57608 57609 25b942 GetModuleFileNameW 57607->57609 57610 24c850 46 API calls 57608->57610 57611 25b95e 57609->57611 57634 25b9b9 57609->57634 57612 25b940 57610->57612 57613 25bcfe 57611->57613 57614 25b96b 57611->57614 57621 266400 77 API calls 57612->57621 58289 2b4556 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 57613->58289 57623 245680 46 API calls 57614->57623 57616 25ba08 58287 271f80 164 API calls 57616->58287 57617 25baaa 58288 274f30 109 API calls 57617->58288 57618 24c850 46 API calls 57620 25bb0c 57618->57620 58070 27a550 57620->58070 57626 25b9a9 57621->57626 57623->57612 57624 25ba18 57628 24c850 46 API calls 57624->57628 57630 24c850 46 API calls 57626->57630 57627 25bab9 57631 24c850 46 API calls 57627->57631 57637 25ba2b 57628->57637 57630->57634 57641 25ba73 57631->57641 57632 25bd03 57632->57506 57633 24c850 46 API calls 57635 25bb4b 57633->57635 57634->57616 57634->57617 57634->57641 57639 24c850 46 API calls 57637->57639 57639->57641 57641->57618 57657->57577 57657->57578 59245 25dd10 57658->59245 57661 27aa70 143 API calls 57662 25b518 57661->57662 57663 25e820 44 API calls 57662->57663 57664 25b55a 57663->57664 59281 25b290 57664->59281 57668 25b587 57669 25f7f0 EnterCriticalSection 57668->57669 57670 25f843 57669->57670 57671 25f88b LeaveCriticalSection 57669->57671 57672 25f849 DestroyWindow 57670->57672 57673 25f859 57670->57673 57675 25f8b1 57671->57675 57672->57673 57673->57671 59378 25fb00 57675->59378 57678 2439b0 54 API calls 57677->57678 57682 2760cb 57678->57682 57679 27651f 57680 243620 2 API calls 57679->57680 57681 276529 57680->57681 57682->57679 57683 2439b0 54 API calls 57682->57683 57684 276100 57683->57684 57684->57679 57685 2439b0 54 API calls 57684->57685 57686 276132 57685->57686 57686->57679 57687 2439b0 54 API calls 57686->57687 57688 276164 57687->57688 57688->57679 57689 2439b0 54 API calls 57688->57689 57690 276196 57689->57690 57690->57679 57691 2439b0 54 API calls 57690->57691 57692 2761c8 57691->57692 57692->57679 57693 2439b0 54 API calls 57692->57693 57694 2762b8 57693->57694 57694->57679 57695 2439b0 54 API calls 57694->57695 57696 2762f7 57695->57696 57696->57679 57697 2439b0 54 API calls 57696->57697 57698 27634d 57697->57698 57698->57679 57699 2439b0 54 API calls 57698->57699 57700 27638c 57699->57700 57700->57679 57701 2439b0 54 API calls 57700->57701 57702 276423 57701->57702 57702->57679 57703 27642e 57702->57703 57734 244450 57703->57734 57706 2469b0 47 API calls 57707 276464 57706->57707 57708 245680 46 API calls 57707->57708 57709 27649e 57708->57709 57792 24c850 57709->57792 57711 2764a7 57712 2443b0 44 API calls 57711->57712 57713 2764b3 57712->57713 57714 2443b0 44 API calls 57713->57714 57715 2764bf 57714->57715 57716 245400 2 API calls 57715->57716 57717 2764da 57716->57717 57718 245060 46 API calls 57717->57718 57719 2764e9 57718->57719 57720 245060 46 API calls 57719->57720 57721 2764fb 57720->57721 57722 2b43af 5 API calls 57721->57722 57723 25b101 57722->57723 57724 27a3e0 57723->57724 57725 2439b0 54 API calls 57724->57725 57726 27a415 57725->57726 57729 2439b0 54 API calls 57726->57729 57732 27a477 57726->57732 57727 243620 2 API calls 57728 27a544 57727->57728 57730 27a447 57729->57730 57731 2439b0 54 API calls 57730->57731 57730->57732 57731->57732 57732->57727 57733 25b113 57732->57733 57733->57545 57735 2444be 57734->57735 57736 2444f6 57734->57736 57737 2b46af 3 API calls 57735->57737 57738 244710 57736->57738 57740 264710 19 API calls 57736->57740 57739 2444c8 57737->57739 57741 242040 46 API calls 57738->57741 57739->57736 57801 2b494f 47 API calls 57739->57801 57742 24450b 57740->57742 57743 244743 57741->57743 57745 244656 GetTempPathW 57742->57745 57746 244513 57742->57746 57747 2b43af 5 API calls 57743->57747 57758 24466a 57745->57758 57749 24456a 57746->57749 57753 2b46af 3 API calls 57746->57753 57750 24476d 57747->57750 57748 2444e5 57802 2b465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57748->57802 57751 24458e GetWindowsDirectoryW 57749->57751 57757 24457a PathFileExistsW 57749->57757 57750->57706 57804 2b9b95 57751->57804 57754 24452a 57753->57754 57754->57749 57756 244536 GetModuleHandleW GetProcAddress 57754->57756 57803 2b465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57756->57803 57757->57758 57764 2445ca 57757->57764 57758->57738 57759 243c00 46 API calls 57758->57759 57762 2446c2 57759->57762 57765 246bc0 47 API calls 57762->57765 57763 244567 57763->57749 57813 264b10 15 API calls 57764->57813 57768 2446da 57765->57768 57767 2445ef 57814 264b10 15 API calls 57767->57814 57768->57738 57770 244774 57768->57770 57817 2b98af 44 API calls 57770->57817 57772 244602 57815 265090 8 API calls 57772->57815 57775 24460d 57777 244645 57775->57777 57778 244611 CreateDirectoryW 57775->57778 57816 2649c0 RtlAllocateHeap LocalFree LocalFree LocalFree RaiseException 57777->57816 57778->57777 57782 244654 57782->57758 57793 24c866 57792->57793 57794 24c8bf 57792->57794 57795 24c8ac 57793->57795 57796 24c876 57793->57796 57794->57711 57797 245680 46 API calls 57795->57797 57798 246070 46 API calls 57796->57798 57799 24c8b7 57797->57799 57800 24c87c 57798->57800 57799->57711 57800->57711 57801->57748 57802->57736 57803->57763 57805 2b9bb2 57804->57805 57807 2b9ba4 57804->57807 57818 2b9d3e 13 API calls 57805->57818 57807->57805 57810 2b9be0 57807->57810 57809 2b9bc6 57809->57757 57810->57809 57820 2b9d3e 13 API calls 57810->57820 57812 2b9bbc 57819 2b989f 44 API calls 57812->57819 57813->57767 57814->57772 57815->57775 57816->57782 57818->57812 57819->57809 57820->57812 57822 25c527 57821->57822 57823 25c487 57821->57823 58290 2b4556 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 57822->58290 57825 2439b0 54 API calls 57823->57825 57826 25c493 57825->57826 57827 25c52c 57826->57827 57828 25c49d 57826->57828 57829 243620 2 API calls 57827->57829 57833 25c4c4 57828->57833 57834 25c4d1 57828->57834 57830 25c536 57829->57830 57831 2439b0 54 API calls 57830->57831 57832 25c57b 57831->57832 57835 25c585 57832->57835 57836 25c693 57832->57836 57838 245350 55 API calls 57833->57838 57841 245680 46 API calls 57834->57841 57843 25c420 66 API calls 57835->57843 57837 243620 2 API calls 57836->57837 57839 25c69d 57837->57839 57840 25c4cf 57838->57840 57842 2b43af 5 API calls 57840->57842 57841->57840 57844 25c51d 57842->57844 57845 25c5b5 57843->57845 57844->57560 57846 25e310 65 API calls 57845->57846 57851 25c5fd 57845->57851 57847 25c5f1 57846->57847 57849 24c850 46 API calls 57847->57849 57848 25c652 57848->57560 57849->57851 57851->57848 58291 25e730 46 API calls 57851->58291 57853 2439b0 54 API calls 57852->57853 57854 25c57b 57853->57854 57855 25c585 57854->57855 57856 25c693 57854->57856 57859 25c420 67 API calls 57855->57859 57857 243620 2 API calls 57856->57857 57858 25c69d 57857->57858 57860 25c5b5 57859->57860 57861 25e310 65 API calls 57860->57861 57864 25c5fd 57860->57864 57862 25c5f1 57861->57862 57865 24c850 46 API calls 57862->57865 57863 25b6a7 57863->57571 57864->57863 58292 25e730 46 API calls 57864->58292 57865->57864 57868 2439b0 54 API calls 57867->57868 57878 26780e 57868->57878 57869 267993 57870 243620 2 API calls 57869->57870 57871 26799d 57870->57871 57872 243620 2 API calls 57871->57872 57873 2679a7 57872->57873 57874 2679e7 57873->57874 57875 2679db Wow64RevertWow64FsRedirection 57873->57875 57874->57589 57875->57874 57876 2b43af 5 API calls 57877 267983 57876->57877 57877->57589 57878->57869 57878->57878 57879 267989 57878->57879 57880 267897 57878->57880 57886 267941 57878->57886 57881 243620 2 API calls 57879->57881 57882 2678a5 57880->57882 58293 2609f0 RtlAllocateHeap RaiseException 57880->58293 57881->57869 58294 2b9d53 44 API calls 57882->58294 57885 2678bd 57885->57871 57885->57886 57886->57876 58295 273430 57887->58295 57890 2439b0 54 API calls 57894 273296 57890->57894 57891 2733d2 57892 243620 2 API calls 57891->57892 57906 25b86a 57891->57906 57893 273427 57892->57893 57894->57891 57895 2439b0 54 API calls 57894->57895 57896 2732d1 57895->57896 57896->57891 57897 2439b0 54 API calls 57896->57897 57898 273301 57897->57898 57898->57891 57899 2439b0 54 API calls 57898->57899 57900 273334 57899->57900 57900->57891 57901 2439b0 54 API calls 57900->57901 57902 27336a 57901->57902 57902->57891 57903 2439b0 54 API calls 57902->57903 57904 2733a0 57903->57904 57904->57891 57905 2439b0 54 API calls 57904->57905 57905->57891 57907 273d70 57906->57907 58339 27c1c0 66 API calls 57907->58339 57911 273f9f 57912 243620 2 API calls 57911->57912 57915 273fa9 57912->57915 57914 273f67 57914->57590 57918 2439b0 54 API calls 57915->57918 57916 245060 46 API calls 57923 273db0 57916->57923 57925 273fe5 57918->57925 57919 245680 46 API calls 57919->57923 57920 246070 46 API calls 57920->57923 57921 2742d2 57922 243620 2 API calls 57921->57922 57955 2742d8 57921->57955 57924 274316 57922->57924 57923->57911 57923->57914 57923->57916 57923->57919 57923->57920 58340 273fb0 56 API calls 57923->58340 58341 27d4a0 68 API calls 57923->58341 58342 271f80 164 API calls 57923->58342 58343 275070 46 API calls 57923->58343 57925->57921 57926 2439b0 54 API calls 57925->57926 57927 274017 57926->57927 57927->57921 57928 2439b0 54 API calls 57927->57928 57929 274047 57928->57929 57929->57921 57930 2439b0 54 API calls 57929->57930 57931 274077 57930->57931 57931->57921 57932 2439b0 54 API calls 57931->57932 57933 2740a7 57932->57933 57933->57921 57934 2439b0 54 API calls 57933->57934 57935 2740d7 57934->57935 57935->57921 57936 2439b0 54 API calls 57935->57936 57937 274107 57936->57937 57937->57921 57938 2439b0 54 API calls 57937->57938 57939 274137 57938->57939 57939->57921 57940 2439b0 54 API calls 57939->57940 57941 274167 57940->57941 57941->57921 57942 2439b0 54 API calls 57941->57942 57943 274197 57942->57943 57943->57921 57944 2439b0 54 API calls 57943->57944 57945 2741c7 57944->57945 57945->57921 57946 2439b0 54 API calls 57945->57946 57947 2741f7 57946->57947 57947->57921 57948 2439b0 54 API calls 57947->57948 57949 274227 57948->57949 57949->57921 57950 2439b0 54 API calls 57949->57950 57951 274273 57950->57951 57951->57921 57952 2439b0 54 API calls 57951->57952 57953 2742a4 57952->57953 57953->57921 57954 2439b0 54 API calls 57953->57954 57954->57921 57955->57590 57957 25dae0 56 API calls 57956->57957 57958 25d6b5 57957->57958 57959 27e940 65 API calls 57958->57959 57960 25d6c8 57959->57960 57961 24c850 46 API calls 57960->57961 57981 25da5b 57960->57981 57962 25d6e8 57961->57962 58344 27a870 57962->58344 57964 25d704 57965 24c850 46 API calls 57964->57965 57967 25d718 57965->57967 57966 25d8fc 58358 25e160 46 API calls 57966->58358 57967->57966 57972 245680 46 API calls 57967->57972 57973 246070 46 API calls 57967->57973 57979 24c850 46 API calls 57967->57979 58354 266b60 57967->58354 58357 25e160 46 API calls 57967->58357 57970 25d90e 57971 27a870 47 API calls 57970->57971 57975 25d920 57971->57975 57972->57967 57973->57967 57976 266400 77 API calls 57975->57976 57975->57981 57986 25d95f 57976->57986 57977 25dad5 57978 243620 2 API calls 57977->57978 57980 25dadf 57978->57980 57979->57967 57981->57595 57982 27a870 47 API calls 57982->57986 57983 266400 77 API calls 57983->57986 57984 245680 46 API calls 57984->57986 57985 246070 46 API calls 57985->57986 57986->57977 57986->57981 57986->57982 57986->57983 57986->57984 57986->57985 57988 2439b0 54 API calls 57987->57988 57991 25db15 57988->57991 57989 243620 2 API calls 57990 25dbe5 57989->57990 57992 2439b0 54 API calls 57991->57992 57997 25dba3 57991->57997 57993 25db47 57992->57993 57994 2439b0 54 API calls 57993->57994 57993->57997 57995 25db77 57994->57995 57996 2439b0 54 API calls 57995->57996 57995->57997 57996->57997 57997->57989 57998 25b893 57997->57998 57999 27e940 57998->57999 58000 2439b0 54 API calls 57999->58000 58004 27e96f 58000->58004 58001 27ece7 58002 243620 2 API calls 58001->58002 58003 27ecf1 58002->58003 58004->58001 58005 27e9a6 58004->58005 58006 27e9b1 58004->58006 58007 245350 55 API calls 58005->58007 58008 245680 46 API calls 58006->58008 58009 27e9af 58007->58009 58008->58009 58373 27f840 46 API calls 58009->58373 58011 27e9cf 58012 27ea06 58011->58012 58013 2439b0 54 API calls 58011->58013 58012->57601 58014 27ea21 58013->58014 58014->58001 58015 27ea63 58014->58015 58016 27ea58 58014->58016 58017 245680 46 API calls 58015->58017 58018 245350 55 API calls 58016->58018 58019 27ea61 58017->58019 58018->58019 58374 27f370 RtlAllocateHeap RaiseException 58019->58374 58021 27ea81 58022 27eacc 58021->58022 58023 24c850 46 API calls 58021->58023 58024 2439b0 54 API calls 58022->58024 58023->58022 58025 27ead1 58024->58025 58025->58001 58026 27eb15 58025->58026 58027 27eb0a 58025->58027 58029 245680 46 API calls 58026->58029 58028 245350 55 API calls 58027->58028 58030 27eb13 58028->58030 58029->58030 58375 27f370 RtlAllocateHeap RaiseException 58030->58375 58032 27eb34 58033 27eb7a 58032->58033 58034 24c850 46 API calls 58032->58034 58035 2439b0 54 API calls 58033->58035 58034->58033 58036 27eb7f 58035->58036 58036->58001 58037 27ebc3 58036->58037 58038 27ebb8 58036->58038 58039 245680 46 API calls 58037->58039 58040 245350 55 API calls 58038->58040 58041 27ebc1 58039->58041 58040->58041 58376 27f370 RtlAllocateHeap RaiseException 58041->58376 58043 27ebe2 58044 27ec28 58043->58044 58045 24c850 46 API calls 58043->58045 58046 2439b0 54 API calls 58044->58046 58045->58044 58047 27ec2d 58046->58047 58047->58001 58059 2439b0 54 API calls 58058->58059 58060 273b4d 58059->58060 58061 273b57 58060->58061 58062 273c19 58060->58062 58065 273b84 58061->58065 58066 273b8f 58061->58066 58063 243620 2 API calls 58062->58063 58064 273c23 58063->58064 58067 245350 55 API calls 58065->58067 58378 266150 58066->58378 58069 273b8d 58067->58069 58069->57607 58071 2439b0 54 API calls 58070->58071 58072 27a57d 58071->58072 58073 27a583 58072->58073 58074 27a5fd 58072->58074 58077 245350 55 API calls 58073->58077 58075 243620 2 API calls 58074->58075 58076 27a607 58075->58076 58078 27a5ac 58077->58078 58389 27a610 58078->58389 58080 25bb3d 58080->57633 58284->57596 58285->57582 58286->57602 58287->57624 58288->57627 58289->57632 58290->57827 58291->57848 58292->57863 58293->57882 58294->57885 58296 2439b0 54 API calls 58295->58296 58299 273465 58296->58299 58297 243620 2 API calls 58298 273835 58297->58298 58300 2439b0 54 API calls 58299->58300 58337 2737f3 58299->58337 58301 273497 58300->58301 58302 2439b0 54 API calls 58301->58302 58301->58337 58303 2734c7 58302->58303 58304 2439b0 54 API calls 58303->58304 58303->58337 58305 2734f7 58304->58305 58306 2439b0 54 API calls 58305->58306 58305->58337 58307 273527 58306->58307 58308 2439b0 54 API calls 58307->58308 58307->58337 58309 273557 58308->58309 58310 2439b0 54 API calls 58309->58310 58309->58337 58311 273587 58310->58311 58312 2439b0 54 API calls 58311->58312 58311->58337 58313 2735b7 58312->58313 58314 2439b0 54 API calls 58313->58314 58313->58337 58315 2735e7 58314->58315 58316 2439b0 54 API calls 58315->58316 58315->58337 58317 273617 58316->58317 58318 2439b0 54 API calls 58317->58318 58317->58337 58319 273647 58318->58319 58320 2439b0 54 API calls 58319->58320 58319->58337 58321 273677 58320->58321 58322 2439b0 54 API calls 58321->58322 58321->58337 58323 2736a7 58322->58323 58324 2439b0 54 API calls 58323->58324 58323->58337 58325 2736d7 58324->58325 58326 2439b0 54 API calls 58325->58326 58325->58337 58327 273707 58326->58327 58328 2439b0 54 API calls 58327->58328 58327->58337 58329 273737 58328->58329 58330 2439b0 54 API calls 58329->58330 58329->58337 58331 273767 58330->58331 58332 2439b0 54 API calls 58331->58332 58331->58337 58333 273797 58332->58333 58334 2439b0 54 API calls 58333->58334 58333->58337 58335 2737c7 58334->58335 58336 2439b0 54 API calls 58335->58336 58335->58337 58336->58337 58337->58297 58338 273287 58337->58338 58338->57890 58339->57923 58340->57923 58341->57923 58342->57923 58343->57923 58345 27a8be 58344->58345 58350 27a8a4 58344->58350 58346 27a90c 58345->58346 58348 27a901 58345->58348 58349 27a8cd 58345->58349 58346->57964 58360 27b4e0 46 API calls 58348->58360 58351 246070 46 API calls 58349->58351 58350->58345 58359 2c0534 45 API calls 58350->58359 58353 27a8dd 58351->58353 58353->57964 58361 266ba0 58354->58361 58357->57967 58358->57970 58359->58350 58360->58346 58362 266bdc 58361->58362 58365 266be6 58361->58365 58364 2b43af 5 API calls 58362->58364 58363 266cd5 58367 243620 2 API calls 58363->58367 58366 266b88 58364->58366 58365->58362 58365->58363 58369 266c06 58365->58369 58366->57967 58368 266cdf 58367->58368 58369->58362 58370 266c65 58369->58370 58371 266c82 GetLastError 58369->58371 58370->58362 58372 266c9f FindClose 58370->58372 58371->58370 58372->58362 58373->58011 58374->58021 58375->58032 58376->58043 58379 26615d MultiByteToWideChar 58378->58379 58380 2661ba 58378->58380 58379->58380 58381 266175 58379->58381 58382 245400 2 API calls 58380->58382 58383 266190 MultiByteToWideChar 58381->58383 58384 2661c1 58382->58384 58385 2661a7 58383->58385 58386 2661c9 58383->58386 58384->58069 58385->58069 58387 243620 2 API calls 58386->58387 58388 2661d3 58387->58388 58390 27a647 GetActiveWindow 58389->58390 58391 27a7be 58389->58391 58392 27a663 58390->58392 58393 27a66f 58390->58393 58391->58080 58394 27ba50 12 API calls 58392->58394 58395 27a692 58393->58395 58428 2b1f2a GetProcessHeap HeapAlloc 58393->58428 58396 27a66a KiUserCallbackDispatcher 58394->58396 58396->58393 59246 25ddfb 59245->59246 59275 25dd63 59245->59275 59251 25de36 59246->59251 59252 25e018 59246->59252 59279 25dea2 59246->59279 59247 25e01d 59249 243620 2 API calls 59247->59249 59248 25dd77 DeleteFileW 59248->59247 59248->59275 59256 25e027 59249->59256 59250 25dfd6 59254 25e820 44 API calls 59250->59254 59253 25de41 59251->59253 59258 25de76 59251->59258 59259 25de4d 59251->59259 59323 243430 45 API calls 59252->59323 59320 27b6d0 46 API calls 59253->59320 59260 25dff3 59254->59260 59324 2442d0 RaiseException 59256->59324 59257 246070 46 API calls 59257->59279 59265 2b43d4 3 API calls 59258->59265 59259->59256 59263 25de58 59259->59263 59264 2b43af 5 API calls 59260->59264 59261 266400 77 API calls 59261->59275 59269 2b43d4 3 API calls 59263->59269 59270 25b419 59264->59270 59265->59253 59267 25e02c 59325 2b98af 44 API calls 59267->59325 59268 245060 46 API calls 59268->59279 59273 25de5e 59269->59273 59270->57661 59273->59253 59273->59267 59275->59246 59275->59247 59275->59248 59275->59261 59300 2669c0 59275->59300 59276 25df9b PathIsDirectoryW 59276->59279 59277 25df60 FindClose 59277->59276 59277->59279 59279->59250 59279->59257 59279->59268 59279->59276 59279->59277 59321 25e270 RtlAllocateHeap RaiseException 59279->59321 59322 27b350 46 API calls 59279->59322 59282 25b2cb 59281->59282 59283 27b9e0 4 API calls 59282->59283 59284 25b307 59283->59284 59286 25b322 59284->59286 59348 2b1fd6 10 API calls 59284->59348 59287 276530 59286->59287 59289 276582 59287->59289 59290 2765ae 59287->59290 59288 2768ba 59291 243620 2 API calls 59288->59291 59289->59288 59292 276596 DeleteFileW 59289->59292 59349 2768d0 59290->59349 59294 2768c4 59291->59294 59292->59289 59292->59290 59295 2765c0 59367 279930 59295->59367 59297 27660b 59298 276743 CloseHandle 59297->59298 59299 276754 59297->59299 59298->59299 59299->57668 59301 2439b0 54 API calls 59300->59301 59305 2669f5 59301->59305 59302 266b52 59303 243620 2 API calls 59302->59303 59304 266b5c 59303->59304 59305->59302 59306 266b48 59305->59306 59307 266a38 59305->59307 59308 243620 2 API calls 59306->59308 59309 266a42 59307->59309 59310 266a88 59307->59310 59308->59302 59312 264320 56 API calls 59309->59312 59311 24c850 46 API calls 59310->59311 59316 266a59 59311->59316 59313 266a4c 59312->59313 59315 24c850 46 API calls 59313->59315 59314 266ae1 59314->59275 59315->59316 59316->59314 59326 264320 59316->59326 59318 266ac2 59318->59314 59319 2669c0 56 API calls 59318->59319 59319->59314 59320->59279 59321->59279 59322->59279 59327 264397 59326->59327 59328 264363 59326->59328 59331 2439b0 54 API calls 59327->59331 59339 2643b8 59327->59339 59329 246070 46 API calls 59328->59329 59330 26436b 59329->59330 59330->59318 59331->59339 59332 2644aa 59334 243620 2 API calls 59332->59334 59333 26449b 59335 243620 2 API calls 59333->59335 59336 2644b4 59334->59336 59337 2644a5 59335->59337 59347 2455b0 46 API calls 59337->59347 59339->59332 59339->59333 59339->59337 59340 26442e 59339->59340 59341 26444a 59340->59341 59345 2b9d3e 13 API calls 59340->59345 59341->59318 59343 26446c 59346 2b989f 44 API calls 59343->59346 59345->59343 59346->59341 59347->59332 59348->59286 59350 276a82 59349->59350 59351 27690a 59349->59351 59350->59295 59351->59350 59356 276942 59351->59356 59372 276ae0 82 API calls 59351->59372 59352 2769e8 59353 276a49 59352->59353 59355 276ad0 59352->59355 59359 276a09 RemoveDirectoryW GetLastError 59352->59359 59374 25e160 46 API calls 59352->59374 59375 2799f0 46 API calls 59353->59375 59358 243620 2 API calls 59355->59358 59356->59352 59356->59355 59357 2769a1 DeleteFileW GetLastError 59356->59357 59360 2769c5 59357->59360 59361 276ada 59358->59361 59359->59352 59360->59352 59360->59355 59360->59356 59373 25e160 46 API calls 59360->59373 59363 276a55 59363->59350 59363->59355 59376 25e160 46 API calls 59363->59376 59368 2799ae 59367->59368 59369 279963 59367->59369 59368->59297 59369->59368 59377 2b98af 44 API calls 59369->59377 59372->59356 59373->59360 59374->59352 59375->59363 59376->59363 59379 25f708 59378->59379 59381 25fb31 59378->59381 59379->57511 59379->57512 59380 25fb9e DeleteCriticalSection 59380->59379 59381->59378 59383 25fb47 59381->59383 59384 25fae0 RaiseException 59381->59384 59383->59380 59384->59381 59386 2c4124 59385->59386 59387 2c4112 59385->59387 59399 2c3fad 59386->59399 59416 2b548d GetModuleHandleW 59387->59416 59391 2c4117 59391->59386 59417 2c41d1 GetModuleHandleExW 59391->59417 59392 2b4d45 59392->57523 59396 2c4166 59396->59392 59411 2c41a3 59396->59411 59400 2c3fb9 59399->59400 59423 2c2301 EnterCriticalSection 59400->59423 59402 2c3fc3 59424 2c3ffd 59402->59424 59404 2c3fd0 59428 2c3fee 59404->59428 59407 2c9853 59408 2c9862 59407->59408 59409 2c986f 59408->59409 59433 2c723d 59408->59433 59409->59396 59412 2c41be 59411->59412 59413 2c41ae GetCurrentProcess TerminateProcess 59411->59413 59414 2c41d1 3 API calls 59412->59414 59413->59412 59415 2c41c6 ExitProcess 59414->59415 59416->59391 59418 2c4210 GetProcAddress 59417->59418 59419 2c4231 59417->59419 59418->59419 59420 2c4224 59418->59420 59421 2c4237 FreeLibrary 59419->59421 59422 2c4123 59419->59422 59420->59419 59421->59422 59422->59386 59423->59402 59426 2c4009 59424->59426 59425 2c406d 59425->59404 59426->59425 59431 2c4aef 13 API calls 59426->59431 59432 2c2351 LeaveCriticalSection 59428->59432 59430 2c3fdc 59430->59392 59430->59407 59431->59425 59432->59430 59434 2c724e 59433->59434 59436 2c7268 59433->59436 59434->59436 59437 2c710d 59434->59437 59436->59409 59442 2c711e 59437->59442 59438 2c715a 59453 2c2301 EnterCriticalSection 59438->59453 59439 2c71c6 GetProcAddress 59439->59438 59442->59438 59442->59439 59444 2c71b7 59442->59444 59454 2c71da LoadLibraryExW GetLastError LoadLibraryExW 59442->59454 59443 2c7163 VirtualProtect 59445 2c71d4 59443->59445 59446 2c7180 VirtualProtect 59443->59446 59444->59439 59448 2c71bf FreeLibrary 59444->59448 59456 2bfc6b 44 API calls 59445->59456 59446->59445 59447 2c71a8 59446->59447 59455 2c2351 LeaveCriticalSection 59447->59455 59448->59439 59452 2c71af 59452->59436 59453->59443 59454->59442 59455->59452 59457 2c6c70 59467 2c7643 59457->59467 59468 2c6c75 59467->59468 59469 2c7651 59467->59469 59471 2c738c FlsAlloc 59468->59471 59469->59468 59470 2c710d 44 API calls 59469->59470 59470->59468

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1272 25b5a0-25b61a call 25c420 call 24c850 1277 25b630-25b66b call 266400 call 24c850 1272->1277 1278 25b61c-25b62c 1272->1278 1284 25b681-25b6d2 call 24c850 call 2661e0 call 25c540 call 245060 1277->1284 1285 25b66d-25b67d 1277->1285 1278->1277 1295 25b6d4-25b6e8 1284->1295 1296 25b6eb-25b719 call 245060 1284->1296 1285->1284 1295->1296 1302 25b722-25b758 1296->1302 1303 25b71b-25b71d 1296->1303 1305 25b85e-25b8a5 call 273230 call 273d70 call 25d680 call 25dae0 call 27e940 1302->1305 1306 25b75e-25b78a CreateFileW 1302->1306 1304 25bcb9-25bcc9 1303->1304 1307 25bcd9-25bcfd call 2b43af 1304->1307 1308 25bccb-25bcd2 FindClose 1304->1308 1341 25b8a7-25b8c5 call 246070 1305->1341 1342 25b906-25b933 call 25dbf0 call 273b20 1305->1342 1310 25b79d-25b7c0 SetFilePointer 1306->1310 1311 25b78c-25b798 1306->1311 1308->1307 1312 25b7c2-25b7dc call 2677d0 1310->1312 1313 25b83e-25b84b 1310->1313 1316 25b84e-25b854 CloseHandle 1311->1316 1324 25b7ec-25b7fd ReadFile 1312->1324 1325 25b7de-25b7e9 call 2454d0 1312->1325 1318 25b84d 1313->1318 1319 25b85b 1313->1319 1316->1319 1318->1316 1319->1305 1328 25b813-25b828 1324->1328 1329 25b7ff-25b803 1324->1329 1325->1324 1328->1313 1334 25b82a-25b83a 1328->1334 1329->1328 1332 25b805-25b811 call 27f480 1329->1332 1332->1328 1334->1313 1347 25b8c7-25b8dc call 26a540 1341->1347 1348 25b8df-25b8ed 1341->1348 1353 25b935-25b940 call 24c850 1342->1353 1354 25b942-25b958 GetModuleFileNameW 1342->1354 1347->1348 1348->1342 1351 25b8ef-25b903 1348->1351 1351->1342 1365 25b99f-25b9cd call 266400 call 24c850 1353->1365 1357 25b95e-25b965 1354->1357 1358 25b9eb-25b9f2 1354->1358 1361 25bcfe-25bd5f call 2b4556 call 25eb90 1357->1361 1362 25b96b-25b97e 1357->1362 1363 25b9f8-25ba02 1358->1363 1364 25bafa-25bb96 call 24c850 call 27a550 call 24c850 * 2 call 26f8e0 call 269b20 call 259d40 1358->1364 1367 25b981-25b98a 1362->1367 1368 25ba08-25ba3f call 271f80 call 24c850 1363->1368 1369 25baaa-25badd call 274f30 call 24c850 1363->1369 1422 25bbac-25bbd5 call 266400 SetCurrentDirectoryW 1364->1422 1423 25bb98-25bba8 1364->1423 1399 25b9e3-25b9e6 call 2661e0 1365->1399 1400 25b9cf-25b9df 1365->1400 1367->1367 1373 25b98c-25b99a call 245680 1367->1373 1396 25ba55-25ba87 call 266250 call 24c850 1368->1396 1397 25ba41-25ba51 1368->1397 1394 25baf3 1369->1394 1395 25badf-25baef 1369->1395 1373->1365 1394->1364 1395->1394 1414 25ba9d-25baa8 call 2661e0 1396->1414 1415 25ba89-25ba99 1396->1415 1397->1396 1399->1358 1400->1399 1414->1394 1415->1414 1427 25bbd7-25bbe7 1422->1427 1428 25bbeb-25bc0f OpenMutexW 1422->1428 1423->1422 1427->1428 1429 25bc36-25bc41 WaitForSingleObject 1428->1429 1430 25bc11-25bc1a GetLastError 1428->1430 1433 25bc73-25bc85 CloseHandle 1429->1433 1434 25bc43-25bc55 CloseHandle 1429->1434 1431 25bc1c-25bc27 1430->1431 1432 25bc29-25bc34 1430->1432 1436 25bc5c-25bc68 call 25cb20 1431->1436 1437 25bc8c 1432->1437 1433->1437 1434->1436 1440 25bc6d-25bc71 1436->1440 1439 25bc91-25bcb6 call 25bdb0 call 25eb90 1437->1439 1439->1304 1440->1439
                                                                      APIs
                                                                        • Part of subcall function 0025C420: GetModuleFileNameW.KERNEL32(00000000,?,00000104,2DDDF7D7,00000000,?,?,002D98E6,000000FF), ref: 0025C474
                                                                      • FindFirstFileW.KERNELBASE(?,00000000,.ini,00000004,?,?,?,00000000,00000000,?,2DDDF7D7), ref: 0025B706
                                                                      • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0025B771
                                                                      • SetFilePointer.KERNELBASE(00000000,00000002,?,00000000), ref: 0025B7B7
                                                                      • ReadFile.KERNELBASE(00000000,?,?,?,00000000,00000078,?), ref: 0025B7F5
                                                                      • CloseHandle.KERNELBASE(00000000), ref: 0025B84E
                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 0025B950
                                                                      • SetCurrentDirectoryW.KERNELBASE(00000000), ref: 0025BBBD
                                                                      • OpenMutexW.KERNEL32(00100000,00000000,Global\_MSIExecute), ref: 0025BBF7
                                                                      • GetLastError.KERNEL32 ref: 0025BC11
                                                                      • FindClose.KERNEL32(?), ref: 0025BCCC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseFindModuleName$CreateCurrentDirectoryErrorFirstHandleLastMutexOpenPointerRead
                                                                      • String ID: 2Svp1Sv$.ini$0!$$Global\_MSIExecute$h1
                                                                      • API String ID: 1061481847-673961966
                                                                      • Opcode ID: e0371bd4244a2033a06cc419548a6762a39536c0af84bbcf3bb053d55940ea30
                                                                      • Instruction ID: 8d66d8a22618b664c43fd3d48aac501cb533fc24915b385d01ffefe49e79967a
                                                                      • Opcode Fuzzy Hash: e0371bd4244a2033a06cc419548a6762a39536c0af84bbcf3bb053d55940ea30
                                                                      • Instruction Fuzzy Hash: 2032E230910249DFDB15DFA8CC88BAEBBB5BF04314F244168E815AB2D1DB749E19CFA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1445 28e3a0-28e458 call 246530 call 246070 * 2 call 268f40 1454 28e45e-28e46d 1445->1454 1455 28e714-28e71f call 243620 1445->1455 1456 28e46f-28e472 call 245610 1454->1456 1457 28e477-28e48a call 2c0bc5 1454->1457 1456->1457 1457->1455 1463 28e490-28e4c0 call 246070 1457->1463 1466 28e4da-28e4df 1463->1466 1467 28e4c2-28e4d5 1463->1467 1468 28e594-28e5d4 1466->1468 1469 28e4e5-28e4ec 1466->1469 1467->1466 1471 28e5df-28e5eb ShellExecuteExW 1468->1471 1472 28e5d6-28e5dc GetForegroundWindow 1468->1472 1470 28e4f0-28e4f6 1469->1470 1474 28e4f8-28e4fb 1470->1474 1475 28e516-28e518 1470->1475 1476 28e5ed-28e5f3 1471->1476 1477 28e612-28e635 call 28e7a0 1471->1477 1472->1471 1478 28e4fd-28e505 1474->1478 1479 28e512-28e514 1474->1479 1480 28e51b-28e51d 1475->1480 1481 28e5fa-28e60c ShellExecuteExW 1476->1481 1482 28e5f5-28e5f8 1476->1482 1490 28e664-28e684 call 28e720 1477->1490 1491 28e637-28e65e GetModuleHandleW GetProcAddress GetProcessId AllowSetForegroundWindow 1477->1491 1478->1475 1484 28e507-28e510 1478->1484 1479->1480 1485 28e51f-28e524 1480->1485 1486 28e555-28e591 GetWindowsDirectoryW call 259d40 * 2 1480->1486 1481->1477 1482->1477 1482->1481 1484->1470 1484->1479 1489 28e526-28e52c 1485->1489 1486->1468 1494 28e54c-28e54e 1489->1494 1495 28e52e-28e531 1489->1495 1503 28e69d-28e6ae 1490->1503 1504 28e686-28e69a 1490->1504 1491->1490 1501 28e551-28e553 1494->1501 1499 28e548-28e54a 1495->1499 1500 28e533-28e53b 1495->1500 1499->1501 1500->1494 1505 28e53d-28e546 1500->1505 1501->1468 1501->1486 1506 28e6b0-28e6c0 1503->1506 1507 28e6c4-28e6d9 1503->1507 1504->1503 1505->1489 1505->1499 1506->1507 1509 28e6db-28e6eb 1507->1509 1510 28e6ef-28e713 call 2b43af 1507->1510 1509->1510
                                                                      APIs
                                                                      • GetWindowsDirectoryW.KERNEL32(00000010,00000104,?,00000004,?,00000000,?), ref: 0028E55E
                                                                      • GetForegroundWindow.USER32(?,00000004,?,00000000,?), ref: 0028E5D6
                                                                      • ShellExecuteExW.SHELL32(?), ref: 0028E5E3
                                                                      • ShellExecuteExW.SHELL32(?), ref: 0028E60C
                                                                      • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId), ref: 0028E641
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0028E648
                                                                      • GetProcessId.KERNELBASE ref: 0028E65B
                                                                      • AllowSetForegroundWindow.USER32(00000000), ref: 0028E65E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExecuteForegroundShellWindow$AddressAllowDirectoryHandleModuleProcProcessWindows
                                                                      • String ID: %s\System32\cmd.exe$.bat$.cmd$/C ""%s" %s"$GetProcessId$Kernel32.dll$open$runas
                                                                      • API String ID: 2271306907-986041216
                                                                      • Opcode ID: 6b5f159f42f7681a21a1f8427e968b51764968bd380db44fed50d14f87c7c2cc
                                                                      • Instruction ID: 367ca6ee65dfbd0476c68f97af3f5a045d4daebe711a14295651a564a5fad1bb
                                                                      • Opcode Fuzzy Hash: 6b5f159f42f7681a21a1f8427e968b51764968bd380db44fed50d14f87c7c2cc
                                                                      • Instruction Fuzzy Hash: 2FB1CE74A11249CFDF04EFA8C888AADBBB9FF18314F144169E515EB391EB34A914CF61

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1634 264710-264777 GetCurrentProcess OpenProcessToken 1637 264786-2647a5 GetTokenInformation 1634->1637 1638 264779-264781 GetLastError 1634->1638 1640 2647d7-2647db 1637->1640 1641 2647a7-2647b0 GetLastError 1637->1641 1639 264846-264859 1638->1639 1644 26485b-264862 CloseHandle 1639->1644 1645 264869-264885 call 2b43af 1639->1645 1642 2647dd-26480c AllocateAndInitializeSid 1640->1642 1643 26482a GetLastError 1640->1643 1641->1643 1646 2647b2-2647d5 call 264890 GetTokenInformation 1641->1646 1647 264830 1642->1647 1648 26480e-264828 EqualSid FreeSid 1642->1648 1643->1647 1644->1645 1646->1640 1646->1643 1651 264832-26483f call 2b4964 1647->1651 1648->1651 1651->1639
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 00264762
                                                                      • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 0026476F
                                                                      • GetLastError.KERNEL32 ref: 00264779
                                                                      • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,002DAE75), ref: 0026479D
                                                                      • GetLastError.KERNEL32 ref: 002647A7
                                                                      • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,002DAE75,002DAE75,002DAE75), ref: 002647CD
                                                                      • AllocateAndInitializeSid.ADVAPI32(00000000,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00264804
                                                                      • EqualSid.ADVAPI32(00000000,?), ref: 00264813
                                                                      • FreeSid.ADVAPI32(?), ref: 00264822
                                                                      • CloseHandle.KERNELBASE(00000000), ref: 0026485C
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Token$ErrorInformationLastProcess$AllocateCloseCurrentEqualFreeHandleInitializeOpen
                                                                      • String ID:
                                                                      • API String ID: 695978879-0
                                                                      • Opcode ID: acc93b617648d426a2d1d2a33e25a78b6c0d44b053bab736bb88b77d82ad41fd
                                                                      • Instruction ID: 4e20325f062544a252d576f3127d190e3b24a26ced94a098a56ca48cb0214888
                                                                      • Opcode Fuzzy Hash: acc93b617648d426a2d1d2a33e25a78b6c0d44b053bab736bb88b77d82ad41fd
                                                                      • Instruction Fuzzy Hash: 0641467195425AEBDF11EFA0DC89BEEBBB8FF08314F104019E501B7290D7799A58CBA0

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1715 24ab00-24ab55 1716 24b436-24b43b call 243620 1715->1716 1717 24ab5b-24ab5e 1715->1717 1720 24b440 call 2b98af 1716->1720 1717->1716 1719 24ab64-24ab7a 1717->1719 1721 24ab80-24ab8a call 2439b0 1719->1721 1722 24ac39-24aca8 call 2b2684 call 24d0b0 call 248d00 call 24cee0 1719->1722 1726 24b445 call 2bf99b 1720->1726 1730 24ab90-24abc8 call 245060 1721->1730 1731 24b45b-24b460 call 243620 1721->1731 1750 24acb0-24acb9 1722->1750 1733 24b44a-24b456 call 2b2e9d 1726->1733 1751 24abec-24ac1a call 26a750 1730->1751 1752 24abca-24abcf 1730->1752 1738 24b465-24b46a call 243620 1731->1738 1733->1731 1743 24b46f-24b552 call 243620 call 2b6430 call 2469b0 1738->1743 1771 24b554 1743->1771 1772 24b556-24b56d 1743->1772 1750->1750 1754 24acbb-24ace5 call 24d510 1750->1754 1751->1722 1767 24ac1c-24ac36 1751->1767 1755 24abd0-24abd9 1752->1755 1763 24ace7-24acee 1754->1763 1764 24ad2e-24ad4e 1754->1764 1755->1755 1760 24abdb-24abe7 call 245060 1755->1760 1760->1751 1763->1764 1768 24acf0-24acf5 1763->1768 1769 24ad50-24ad67 1764->1769 1770 24ad7c-24add4 call 266ce0 1764->1770 1767->1722 1768->1764 1775 24acf7 1768->1775 1769->1770 1788 24ad69-24ad77 1769->1788 1783 24add7-24ade0 1770->1783 1771->1772 1774 24b570-24b579 1772->1774 1774->1774 1777 24b57b-24b619 call 243c00 call 2b43d4 call 2bfbcc 1774->1777 1778 24ad00-24ad26 1775->1778 1800 24b61f-24b65d call 254840 1777->1800 1801 24b71b-24b727 call 2b2e9d 1777->1801 1796 24ad28 1778->1796 1783->1783 1786 24ade2-24ae4a call 243c00 call 246bc0 call 2443b0 call 243c00 call 246700 1783->1786 1823 24ae50-24ae91 call 243c00 call 246700 1786->1823 1824 24aeda 1786->1824 1788->1770 1796->1764 1807 24b72c call 2bf99b 1800->1807 1810 24b663-24b67b 1800->1810 1801->1807 1815 24b731-24b77f call 2b98af 1807->1815 1813 24b67d-24b68f 1810->1813 1814 24b6af-24b71a call 2443b0 * 3 call 2b43af 1810->1814 1819 24b6a5-24b6ac call 2b43bd 1813->1819 1820 24b691-24b69f 1813->1820 1827 24b795-24b7a5 1815->1827 1828 24b781-24b791 1815->1828 1819->1814 1820->1815 1820->1819 1823->1824 1853 24ae93-24aed8 call 243c00 call 246700 1823->1853 1831 24aede-24aeea 1824->1831 1828->1827 1834 24aeec-24aefa call 2443b0 1831->1834 1835 24aefd-24af06 1831->1835 1834->1835 1837 24af5f-24af68 1835->1837 1838 24af08-24af14 1835->1838 1847 24afbe-24afc2 1837->1847 1848 24af6a-24af76 1837->1848 1843 24af16-24af28 1838->1843 1844 24af4b-24af5b 1838->1844 1851 24af3e-24af48 call 2b43bd 1843->1851 1852 24af2a-24af38 1843->1852 1844->1837 1849 24afc8-24b01a call 2b43d4 call 2bfbcc 1847->1849 1850 24b069-24b070 call 264710 1847->1850 1855 24af78-24af8a 1848->1855 1856 24afaa-24afba 1848->1856 1849->1733 1880 24b020-24b047 call 254840 1849->1880 1870 24b076-24b090 1850->1870 1871 24b121-24b12b call 2439b0 1850->1871 1851->1844 1852->1720 1852->1851 1853->1824 1853->1831 1861 24afa0-24afa7 call 2b43bd 1855->1861 1862 24af8c-24af9a 1855->1862 1856->1847 1861->1856 1862->1720 1862->1861 1875 24b093-24b09c 1870->1875 1871->1731 1881 24b131-24b15a 1871->1881 1875->1875 1879 24b09e-24b0cc call 243c00 1875->1879 1887 24b0d0-24b0d9 1879->1887 1880->1726 1888 24b04d-24b058 1880->1888 1896 24b167-24b16e call 245680 1881->1896 1897 24b15c-24b165 call 245350 1881->1897 1887->1887 1889 24b0db-24b11c call 243c00 call 24ba30 call 2443b0 * 2 1887->1889 1888->1726 1890 24b05e-24b064 1888->1890 1924 24b1c9 1889->1924 1893 24b1cc-24b1ce 1890->1893 1894 24b1d4-24b1e6 1893->1894 1895 24b2d0-24b2d7 1893->1895 1899 24b35c-24b399 call 24c8d0 call 27ff10 1894->1899 1901 24b1ec-24b1f5 call 2439b0 1894->1901 1895->1899 1900 24b2dd-24b2e6 call 2439b0 1895->1900 1910 24b173-24b18d call 267bd0 1896->1910 1897->1910 1929 24b39b-24b3a8 1899->1929 1900->1743 1916 24b2ec-24b346 call 245060 call 265f60 call 26a750 1900->1916 1901->1738 1917 24b1fb-24b245 call 245060 call 269710 1901->1917 1919 24b192-24b1ad 1910->1919 1916->1899 1957 24b348-24b358 1916->1957 1949 24b247-24b24c 1917->1949 1950 24b269-24b28f call 26a750 1917->1950 1922 24b1c3 1919->1922 1923 24b1af-24b1bf 1919->1923 1922->1924 1923->1922 1924->1893 1931 24b3b6-24b3bb Sleep 1929->1931 1932 24b3aa-24b3b4 1929->1932 1935 24b3c1-24b3c5 1931->1935 1932->1931 1932->1935 1937 24b3c7-24b3d0 1935->1937 1938 24b3d2 1935->1938 1937->1938 1941 24b3d6-24b3ee 1937->1941 1938->1941 1945 24b404-24b433 call 2443b0 call 2b43af 1941->1945 1946 24b3f0-24b400 1941->1946 1946->1945 1953 24b250-24b259 1949->1953 1962 24b2a5-24b2ba 1950->1962 1963 24b291-24b2a1 1950->1963 1953->1953 1958 24b25b-24b264 call 245060 1953->1958 1957->1899 1958->1950 1962->1895 1966 24b2bc-24b2cc 1962->1966 1963->1962 1966->1895
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                        • Part of subcall function 00254840: GetCurrentThreadId.KERNEL32 ref: 00254850
                                                                      • Sleep.KERNEL32(000007D0,?,?,?,?,?,?,?,?,?,?,?,002F3AD2,?,?,?), ref: 0024B3BB
                                                                        • Part of subcall function 00269710: FormatMessageW.KERNEL32(00001300,00000000,00000007,00000400,?,00000000,00000000,2DDDF7D7,00000000,?), ref: 0026975B
                                                                        • Part of subcall function 00269710: GetLastError.KERNEL32 ref: 00269765
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentErrorFormatHeapLastMessageProcessSleepThread
                                                                      • String ID: Launch failed. Error:$Launching file:$Return code of launched file:$appx$h1$h1$h1$msix$msixbundle
                                                                      • API String ID: 290906889-2902177987
                                                                      • Opcode ID: 071ceb8d3d9a19a41c05f5c0c70447a6c9e6048dea8d95429daa67038c3355be
                                                                      • Instruction ID: d8f67ac0e3d03ea32d46b9b074624d5627ab8d80eb200d6aea585eff3ff6994b
                                                                      • Opcode Fuzzy Hash: 071ceb8d3d9a19a41c05f5c0c70447a6c9e6048dea8d95429daa67038c3355be
                                                                      • Instruction Fuzzy Hash: 0482EF70D10249CFDB18DFA8C855BEDBBB4AF48314F24829DE415AB382DB70AA55CF91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 2087 2698c0-269918 LoadLibraryW 2088 269950-269993 GetSystemMetrics * 2 LoadImageW 2087->2088 2089 26991a-26992a GetProcAddress 2087->2089 2090 269996-2699a6 2088->2090 2089->2088 2091 26992c-269945 2089->2091 2092 2699b6-2699c9 2090->2092 2093 2699a8-2699af FreeLibrary 2090->2093 2095 269947-269949 2091->2095 2093->2092 2095->2088 2096 26994b-26994e 2095->2096 2096->2090
                                                                      APIs
                                                                      • LoadLibraryW.KERNEL32(ComCtl32.dll,2DDDF7D7,00000007,00000007,?), ref: 002698FA
                                                                      • GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00269920
                                                                      • GetSystemMetrics.USER32(0000000C), ref: 00269960
                                                                      • GetSystemMetrics.USER32(0000000B), ref: 00269978
                                                                      • LoadImageW.USER32(?,?,00000001,00000000,00000000,?), ref: 0026998B
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 002699A9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoadMetricsSystem$AddressFreeImageProc
                                                                      • String ID: ComCtl32.dll$LoadIconMetric
                                                                      • API String ID: 1983857168-764666640
                                                                      • Opcode ID: 23084bea9ede54ae22275db45af26e0c167987c19d625d756ab99b8ae6caf65b
                                                                      • Instruction ID: fe050093d720ce79b9fe03fd9684ee40e5f1fe66fc2e99ea4561092ea9a7cbfb
                                                                      • Opcode Fuzzy Hash: 23084bea9ede54ae22275db45af26e0c167987c19d625d756ab99b8ae6caf65b
                                                                      • Instruction Fuzzy Hash: F431AEB1A5421AABDB118F94DC58BBFBBB8FB45750F00022EF915A7390D7754D108B90
                                                                      APIs
                                                                      • DeleteFileW.KERNELBASE(?,2DDDF7D7,?,?,?,?,?,?,?,?,?,?,002D9EB6,000000FF), ref: 0025DD87
                                                                      • FindFirstFileW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,?,?,002D9EB6,000000FF), ref: 0025DF0E
                                                                      • FindNextFileW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,?,?,002D9EB6,000000FF), ref: 0025DF56
                                                                      • FindClose.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,002D9EB6,000000FF), ref: 0025DF61
                                                                      • PathIsDirectoryW.SHLWAPI(00000000), ref: 0025DF9D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$CloseDeleteDirectoryFirstNextPath
                                                                      • String ID: 2Svp1Sv$p2Sv3Sv
                                                                      • API String ID: 3278268132-1357901002
                                                                      • Opcode ID: 95a3aca5657c240ac5e4424f01ec929f7e263b91bc25b409c8d0945b10b1a9e2
                                                                      • Instruction ID: 6a13783358f87a7bc21c7dfce5ebd865d953fac188473e6c0c1c8613dffdaab0
                                                                      • Opcode Fuzzy Hash: 95a3aca5657c240ac5e4424f01ec929f7e263b91bc25b409c8d0945b10b1a9e2
                                                                      • Instruction Fuzzy Hash: 68A1F3719106098FDB14DF68CC897EEB7B4FF48321F144229E825AB281DB74AA19CF94
                                                                      APIs
                                                                        • Part of subcall function 00274650: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,?,?,?,00000000,00000000), ref: 0027478F
                                                                        • Part of subcall function 00274650: GetProcAddress.KERNEL32(00000000), ref: 00274796
                                                                        • Part of subcall function 00274650: GetCurrentProcess.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 002747D0
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00274464
                                                                      • FindClose.KERNEL32(00000000), ref: 00274498
                                                                      • FindClose.KERNEL32(00000000), ref: 00274544
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Find$Close$AddressCurrentFileFirstHandleModuleProcProcess
                                                                      • String ID: 2Svp1Sv$0!$
                                                                      • API String ID: 3560309239-655561941
                                                                      • Opcode ID: 446b187d5187029b3c60875f118c21dfa476e51f37c8dc83d08e4166b7cba230
                                                                      • Instruction ID: 8f6859212447e10cfb721e9497081d0e99a847995e58def456903fe5ce6afb68
                                                                      • Opcode Fuzzy Hash: 446b187d5187029b3c60875f118c21dfa476e51f37c8dc83d08e4166b7cba230
                                                                      • Instruction Fuzzy Hash: 8AA1B230915659CBCB24EF28C89876DBBB5EF45324F248399E42DA7391CB31AE51CF81
                                                                      APIs
                                                                      • FindFirstFileW.KERNELBASE(?,?), ref: 00266C41
                                                                      • FindClose.KERNEL32(00000000,?,?), ref: 00266CA0
                                                                        • Part of subcall function 00243620: RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Find$AllocateCloseFileFirstHeap
                                                                      • String ID: 2Svp1Sv$0!$
                                                                      • API String ID: 1673784098-655561941
                                                                      • Opcode ID: a88db5d78e9d6f827a6c73f88bcb28653f9908b1ffbe5b4983d710684df8ab41
                                                                      • Instruction ID: 64292d87343c64b9045efd07acf971a666b6d2ecc893808937832e86b01bdc7d
                                                                      • Opcode Fuzzy Hash: a88db5d78e9d6f827a6c73f88bcb28653f9908b1ffbe5b4983d710684df8ab41
                                                                      • Instruction Fuzzy Hash: A231B031918A19DBDB20DF54D94CB5AB7B4EB48324F20826BE859E7380E7719994CF80
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • RegCreateKeyA.ADVAPI32(80000001,00000001,?), ref: 0027FF95
                                                                      • RegSetValueExA.KERNELBASE(?,?,00000000,00000001,?,?), ref: 0027FFAD
                                                                        • Part of subcall function 00243620: RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 002802C4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocateCreateOpenProcessValue
                                                                      • String ID: -
                                                                      • API String ID: 1583728613-2547889144
                                                                      • Opcode ID: 94d5c6eb4e59cb81d7e242f421b9b6dcddacbbeb27bbadf010e0e3a0aa02bfa7
                                                                      • Instruction ID: a55256bcd5a3f24f7c2b01d9281bdd00cc240ec9f18f383145357fa2fd5650c8
                                                                      • Opcode Fuzzy Hash: 94d5c6eb4e59cb81d7e242f421b9b6dcddacbbeb27bbadf010e0e3a0aa02bfa7
                                                                      • Instruction Fuzzy Hash: 7FE1B375A002199FDB00DF98CC85BAEBBB9FF48320F14422AE915E7391DB75AD15CB90
                                                                      APIs
                                                                      • GetProcessHeap.KERNEL32(00000008,00000008,?,0027A67E), ref: 002B1F2F
                                                                      • HeapAlloc.KERNEL32(00000000), ref: 002B1F36
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B1F7C
                                                                      • HeapFree.KERNEL32(00000000), ref: 002B1F83
                                                                        • Part of subcall function 002B1DC8: GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,002B1F72,00000000), ref: 002B1DEC
                                                                        • Part of subcall function 002B1DC8: HeapAlloc.KERNEL32(00000000,?,002B1F72,00000000), ref: 002B1DF3
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Alloc$Free
                                                                      • String ID:
                                                                      • API String ID: 1864747095-0
                                                                      • Opcode ID: f9cc6f0c2d39dc3713edd2ca1c825b7713edae37071ac801a3e9587003dde0c2
                                                                      • Instruction ID: 46c6527384d88e77749426efb17300047b0351a8b0922739fe1733ca31e63b8d
                                                                      • Opcode Fuzzy Hash: f9cc6f0c2d39dc3713edd2ca1c825b7713edae37071ac801a3e9587003dde0c2
                                                                      • Instruction Fuzzy Hash: 24F0B43269871257C7212BB8BC6DAEB2968AF807E17554429F445CB680DF30C821C760
                                                                      APIs
                                                                      • CoCreateInstance.OLE32(002F13FC,00000000,00000001,002F8A3C,000000B0,2DDDF7D7,00000000,?,00000000,000000A0,-00000010,002E373C,000000FF,?,0028D39B), ref: 00294C6D
                                                                        • Part of subcall function 002B46AF: AcquireSRWLockExclusive.KERNEL32(0030FFB8,?,?,?,00243A56,00310848,2DDDF7D7,?,?,002D516D,000000FF,?,002810B6,2DDDF7D7,?), ref: 002B46BA
                                                                        • Part of subcall function 002B46AF: ReleaseSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243A56,00310848,2DDDF7D7,?,?,002D516D,000000FF,?,002810B6,2DDDF7D7,?), ref: 002B46F4
                                                                        • Part of subcall function 002B465E: AcquireSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243AC7,00310848,002E6460), ref: 002B4668
                                                                        • Part of subcall function 002B465E: ReleaseSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243AC7,00310848,002E6460), ref: 002B469B
                                                                        • Part of subcall function 002B465E: WakeAllConditionVariable.KERNEL32(0030FFB4,?,?,00243AC7,00310848,002E6460), ref: 002B46A6
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExclusiveLock$AcquireRelease$ConditionCreateInstanceVariableWake
                                                                      • String ID:
                                                                      • API String ID: 1170529896-0
                                                                      • Opcode ID: 8bfecfd2efe1466d80bdeea1ceb39b6e70775e32e2e73194dcda7dc55d372a08
                                                                      • Instruction ID: e8c8e9216244b897be3248aece9bc93a9d31f151b27406ec1c29ba26abecb61c
                                                                      • Opcode Fuzzy Hash: 8bfecfd2efe1466d80bdeea1ceb39b6e70775e32e2e73194dcda7dc55d372a08
                                                                      • Instruction Fuzzy Hash: 7A41DF706112419FEB15EF04EC86F8BBBB9FB08714F108129E4259B2D1D3B56961CB99

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 491 25cb20-25cb5c call 2439b0 494 25cb62-25cb8f call 24cb10 491->494 495 25d57a-25d57f call 243620 491->495 506 25cb91-25cb99 call 25e8c0 494->506 507 25cb9e-25cbeb call 279b90 494->507 498 25d584-25d605 call 243620 call 24c660 call 283440 495->498 514 25d607-25d617 498->514 515 25d61b-25d62b 498->515 506->507 516 25cc04-25cc08 507->516 517 25cbed-25cc01 507->517 514->515 518 25cdd5 516->518 519 25cc0e-25cc1f 516->519 517->516 520 25cdd7-25cdf1 518->520 523 25cc21-25cc2d call 274320 519->523 524 25cc32-25cca5 call 27a550 CreateThread 519->524 526 25d514-25d518 520->526 527 25cdf7-25ce05 520->527 536 25cd0e-25cd15 523->536 537 25cca7-25ccad GetLastError 524->537 538 25ccb0-25ccb2 call 267a00 524->538 531 25d528-25d54d 526->531 532 25d51a-25d522 RegDeleteKeyA 526->532 533 25d507-25d50f 527->533 534 25ce0b call 25c6a0 527->534 539 25d563-25d577 531->539 540 25d54f-25d55f 531->540 532->531 550 25d511 533->550 544 25ce10 534->544 545 25cd17-25cd19 536->545 546 25cd5a-25cd61 536->546 537->538 548 25ccb7-25ccc7 538->548 540->539 544->550 551 25cd20-25cd22 545->551 546->518 547 25cd63-25cd6c call 2439b0 546->547 547->495 561 25cd72-25cdbf call 245060 call 26a750 547->561 548->536 554 25ccc9-25ccd7 WaitForSingleObject 548->554 550->526 551->498 552 25cd28-25cd2a 551->552 552->498 555 25cd30-25cd3a 552->555 557 25cd05-25cd08 CloseHandle 554->557 558 25ccd9-25ccef GetExitCodeThread 554->558 559 25ce15-25ce4f call 27b9e0 call 280a50 call 273b20 555->559 560 25cd40-25cd43 555->560 557->536 558->557 562 25ccf1-25ccf8 558->562 577 25ce55-25ce5c 559->577 578 25cf3e-25cf47 call 2439b0 559->578 560->559 563 25cd49-25cd4c 560->563 561->518 583 25cdc1-25cdd1 561->583 562->557 564 25ccfa-25ccff TerminateThread 562->564 563->559 566 25cd52-25cd58 563->566 564->557 566->546 566->551 580 25cecf-25cf0f call 282ff0 call 280f80 call 281eb0 call 282750 577->580 581 25ce5e-25ce67 call 2439b0 577->581 578->495 589 25cf4d-25cf75 578->589 608 25cf15-25cf2e call 280d00 call 282df0 580->608 609 25d273 580->609 581->495 592 25ce6d-25ceb9 call 245060 call 26a750 581->592 583->518 601 25cf77-25cf80 call 245350 589->601 602 25cf82-25cf87 call 266150 589->602 592->580 625 25cebb-25cecb 592->625 607 25cf8c-25cf95 601->607 602->607 612 25cf97-25cf9a 607->612 613 25cf9c-25cfa3 607->613 608->609 644 25cf34-25cf39 608->644 614 25d275-25d27c 609->614 617 25cfc2-25cfde 612->617 618 25cfa5-25cfa8 613->618 619 25cfaa-25cfb6 call 2b5dee 613->619 620 25d335-25d33c 614->620 621 25d282-25d28b call 2439b0 614->621 628 25cff4-25cff8 617->628 629 25cfe0-25cff0 617->629 618->617 646 25cfbd-25cfc0 619->646 647 25cfb8-25cfbb 619->647 630 25d4c4-25d4c8 620->630 631 25d342-25d349 620->631 621->495 648 25d291-25d2e0 call 245060 * 2 621->648 625->580 628->609 639 25cffe-25d005 628->639 629->628 635 25d4ee-25d502 call 25d590 630->635 636 25d4ca-25d4e9 call 25d590 630->636 637 25d3f3-25d3fa 631->637 638 25d34f-25d358 call 2439b0 631->638 635->520 636->520 642 25d400-25d407 637->642 643 25d4b2-25d4b9 637->643 638->495 667 25d35e-25d39e call 245060 638->667 640 25d007-25d010 call 2439b0 639->640 641 25d078-25d08b 639->641 640->495 671 25d016-25d062 call 245060 call 26a750 640->671 653 25d0f2-25d17c call 294b00 call 282ff0 GetActiveWindow 641->653 654 25d08d-25d097 641->654 642->643 659 25d40d-25d416 call 2439b0 642->659 643->630 655 25d4bb-25d4c2 643->655 644->614 646->617 647->617 704 25d2e3-25d2ec 648->704 685 25d1c0-25d253 call 2b202c GetCurrentThreadId EnterCriticalSection LeaveCriticalSection DialogBoxParamW WaitForSingleObject CloseHandle 653->685 686 25d17e-25d188 call 2b1f2a 653->686 662 25d099-25d0a3 call 24c850 call 26f8e0 654->662 663 25d0a8-25d0dc call 269b20 call 259d40 654->663 655->630 655->636 659->495 676 25d41c-25d45c call 245060 659->676 662->663 663->653 691 25d0de-25d0ee 663->691 702 25d3a1-25d3aa 667->702 671->641 725 25d064-25d074 671->725 721 25d460-25d469 676->721 708 25d1ad-25d1b6 call 2841c0 685->708 709 25d259-25d25c 685->709 686->685 705 25d18a-25d1a6 SetLastError WaitForSingleObject CloseHandle 686->705 691->653 702->702 711 25d3ac-25d3dd call 245060 call 26a750 702->711 704->704 710 25d2ee-25d31f call 245060 call 26a750 704->710 705->708 719 25d1bb 708->719 709->708 715 25d262-25d271 call 2841c0 709->715 710->620 736 25d321-25d331 710->736 711->637 735 25d3df-25d3ef 711->735 715->614 719->614 721->721 726 25d46b-25d49c call 245060 call 26a750 721->726 725->641 726->643 738 25d49e-25d4ae 726->738 735->637 736->620 738->643
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                        • Part of subcall function 0024CB10: FindResourceW.KERNEL32(00000000,00000100,00000006,00000000,000000FF,?,00000000,0027A070,000000FF,?,?,?,2DDDF7D7,00000000,?,000000FF), ref: 0024CB4D
                                                                        • Part of subcall function 0024CB10: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,?,2DDDF7D7,00000000,?,000000FF), ref: 0024CB7E
                                                                        • Part of subcall function 0024CB10: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,?,?,00000000,00000000,00000000,?,?,?,2DDDF7D7,00000000,?,000000FF,000000FF), ref: 0024CBB5
                                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0004CE80,?,00000000,?), ref: 0025CC9A
                                                                      • GetLastError.KERNEL32 ref: 0025CCA7
                                                                        • Part of subcall function 0027B9E0: GetCurrentThreadId.KERNEL32 ref: 0027B9E9
                                                                        • Part of subcall function 0027B9E0: DestroyWindow.USER32(?), ref: 0027B9F8
                                                                        • Part of subcall function 0026A750: InitializeCriticalSection.KERNEL32(00310A68,2DDDF7D7,00000000,?), ref: 0026A78C
                                                                        • Part of subcall function 0026A750: EnterCriticalSection.KERNEL32(?,2DDDF7D7,00000000,?), ref: 0026A799
                                                                        • Part of subcall function 0026A750: WriteFile.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A7CB
                                                                        • Part of subcall function 0026A750: FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A7D4
                                                                        • Part of subcall function 0026A750: WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,002F4EF4,00000001,?,?,000000FF,00000000), ref: 0026A86C
                                                                        • Part of subcall function 0026A750: FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A875
                                                                      • WaitForSingleObject.KERNEL32(?,?), ref: 0025CCCD
                                                                      • GetExitCodeThread.KERNEL32(?,?), ref: 0025CCE7
                                                                      • TerminateThread.KERNEL32(?,00000000), ref: 0025CCFF
                                                                      • CloseHandle.KERNEL32(?), ref: 0025CD08
                                                                      • GetActiveWindow.USER32 ref: 0025D16F
                                                                      • SetLastError.KERNEL32(0000000E,?,002F6134), ref: 0025D18C
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,002F6134), ref: 0025D197
                                                                      • CloseHandle.KERNEL32(?,?,002F6134), ref: 0025D1A0
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0025D1D0
                                                                      • EnterCriticalSection.KERNEL32(00312C5C,?,002F6134), ref: 0025D1ED
                                                                      • LeaveCriticalSection.KERNEL32(00312C5C,?,002F6134), ref: 0025D210
                                                                      • DialogBoxParamW.USER32(000000D8,00000000,Function_0003BD70,00000000), ref: 0025D22D
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,002F6134), ref: 0025D23A
                                                                      • CloseHandle.KERNEL32(?,?,002F6134), ref: 0025D243
                                                                        • Part of subcall function 0026A750: WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,?,?,000000FF,00000000), ref: 0026A8BD
                                                                        • Part of subcall function 0026A750: FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A8C6
                                                                        • Part of subcall function 0026A750: WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,002F37E8,00000002,?,?,000000FF,00000000), ref: 0026A935
                                                                        • Part of subcall function 0026A750: FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A93E
                                                                        • Part of subcall function 0026A750: LeaveCriticalSection.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A97A
                                                                      • RegDeleteKeyA.ADVAPI32(80000001,?), ref: 0025D522
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$CriticalSectionThread$BuffersFlushWrite$CloseHandleObjectSingleWait$ByteCharCurrentEnterErrorLastLeaveMultiWideWindow$ActiveCodeCreateDeleteDestroyDialogExitFindHeapInitializeParamProcessResourceTerminate
                                                                      • String ID: Reboot in Progress=$ Reboot was refused=$ Reboot was required=$4a/$After running prerequisites we have:$InterbootContext$No prerequisite must be installed.$Starting installing prerequisites in basic UI mode.$Starting installing prerequisites in silent mode.$Ts/$\,1$false$h1$h1$h1$h1$h1$h1$true$E/
                                                                      • API String ID: 2565466407-3162991964
                                                                      • Opcode ID: 098dcc5b7cb3ac56de8811f89247f8edd49cd01cabe6d3514669f85404725312
                                                                      • Instruction ID: 3666601ea3e53e920019ab54321d1dfac576d42e24e4f34152e216f53f8ab976
                                                                      • Opcode Fuzzy Hash: 098dcc5b7cb3ac56de8811f89247f8edd49cd01cabe6d3514669f85404725312
                                                                      • Instruction Fuzzy Hash: 3972F130910249DFDB15DF68C848BADBBB4AF04324F1482A9F815AB3D1EB749E59CF91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 742 26ef30-26efb2 RegOpenKeyExW 745 26f222-26f23b 742->745 746 26efb8-26efe7 RegQueryValueExW 742->746 747 26f24e-26f269 call 2b43af 745->747 748 26f23d-26f244 RegCloseKey 745->748 749 26f037-26f066 RegQueryValueExW 746->749 750 26efe9-26effb call 246620 746->750 748->747 749->745 751 26f06c-26f07d 749->751 760 26f00c-26f023 call 246620 750->760 761 26effd-26f00a 750->761 754 26f07f 751->754 755 26f08a-26f08c 751->755 758 26f080-26f088 754->758 755->745 759 26f092-26f099 755->759 758->755 758->758 762 26f0a0-26f0ae call 246620 759->762 767 26f025 760->767 768 26f02a-26f030 760->768 763 26f032 761->763 770 26f0b0-26f0b4 762->770 771 26f0b9-26f0c7 call 246620 762->771 763->749 767->768 768->763 772 26f1f4 770->772 776 26f0d2-26f0e0 call 246620 771->776 777 26f0c9-26f0cd 771->777 775 26f1fb-26f208 772->775 778 26f21a-26f21c 775->778 779 26f20a 775->779 783 26f0e2-26f0e6 776->783 784 26f0eb-26f0f9 call 246620 776->784 777->772 778->745 778->762 781 26f210-26f218 779->781 781->778 781->781 783->772 787 26f104-26f112 call 246620 784->787 788 26f0fb-26f0ff 784->788 791 26f114-26f118 787->791 792 26f11d-26f12b call 246620 787->792 788->772 791->772 795 26f136-26f144 call 246620 792->795 796 26f12d-26f131 792->796 799 26f146-26f14a 795->799 800 26f14f-26f15d call 246620 795->800 796->772 799->772 803 26f15f-26f164 800->803 804 26f169-26f177 call 246620 800->804 805 26f1f1 803->805 808 26f180-26f18e call 246620 804->808 809 26f179-26f17e 804->809 805->772 812 26f197-26f1a5 call 246620 808->812 813 26f190-26f195 808->813 809->805 816 26f1a7-26f1ac 812->816 817 26f1ae-26f1bc call 246620 812->817 813->805 816->805 820 26f1c5-26f1d3 call 246620 817->820 821 26f1be-26f1c3 817->821 824 26f1d5-26f1da 820->824 825 26f1dc-26f1ea call 246620 820->825 821->805 824->805 825->775 828 26f1ec 825->828 828->805
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNELBASE(80000002,SYSTEM\CurrentControlSet\Control\ProductOptions,00000000,00020119,00000000), ref: 0026EFAA
                                                                      • RegQueryValueExW.KERNELBASE(00000000,ProductType,00000000,00000000,?,?), ref: 0026EFDF
                                                                      • RegQueryValueExW.KERNELBASE(00000000,ProductSuite,00000000,00000000,?,?), ref: 0026F05E
                                                                      • RegCloseKey.KERNELBASE(00000000), ref: 0026F23E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: QueryValue$CloseOpen
                                                                      • String ID: BackOffice$Blade$CommunicationServer$Compute Server$DataCenter$Embedded(Restricted)$EmbeddedNT$Enterprise$Personal$ProductSuite$ProductType$SYSTEM\CurrentControlSet\Control\ProductOptions$Security Appliance$ServerNT$Small Business$Small Business(Restricted)$Storage Server$Terminal Server$WinNT
                                                                      • API String ID: 1586453840-3149529848
                                                                      • Opcode ID: ef55e6b4a751f21198341fe6c5766f9c8b05fa97a6307dcf8b6cbca9d45c590c
                                                                      • Instruction ID: a241c2c76f347957ca155e60400ead797f5cb23814efdb715dece023c865c1e4
                                                                      • Opcode Fuzzy Hash: ef55e6b4a751f21198341fe6c5766f9c8b05fa97a6307dcf8b6cbca9d45c590c
                                                                      • Instruction Fuzzy Hash: AC71EA30730319CBDF549F24EE557BAB6A8FB46380F1140B5AA0AAB681E774CDF58B41
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?), ref: 002814CE
                                                                      • CloseHandle.KERNEL32(00000000), ref: 002814F5
                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00281502
                                                                      • CloseHandle.KERNEL32(00000000), ref: 0028151A
                                                                      • DeleteFileW.KERNEL32(00000000), ref: 0028190E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseHandle$CreateDeleteSize
                                                                      • String ID: !$Download completed succesfully.$Download failed. Error:$Download was canceled.$Downloaded file was accepted.$Downloaded file was rejected.(Invalid size or MD5).$Launching URL:$Starting download of:$[InternetShortcut]URL=%s$h1$h1$h1$h1$h1$h1$h1$open
                                                                      • API String ID: 3145970413-2650351814
                                                                      • Opcode ID: 0e74d535df7fb693d44eb39224940c7c8117dde793619728972dbff76efba7d4
                                                                      • Instruction ID: d4558bea9e0b3ce36206924fd151f6f48ca470d1aeb3de1124c7d609b6d16c8a
                                                                      • Opcode Fuzzy Hash: 0e74d535df7fb693d44eb39224940c7c8117dde793619728972dbff76efba7d4
                                                                      • Instruction Fuzzy Hash: E772E434A11255CFCB05DF68C894AADBBB9FF48310F184259E915AB3D1DB30AD66CF90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1083 26eb80-26ec00 RegOpenKeyExW 1086 26ec06-26ec69 RegQueryValueExW * 2 1083->1086 1087 26eede-26eef7 1083->1087 1088 26eccb-26ed10 RegQueryValueExW 1086->1088 1089 26ec6b-26eca1 RegQueryValueExW 1086->1089 1090 26ef0a-26ef23 call 2b43af 1087->1090 1091 26eef9-26ef00 RegCloseKey 1087->1091 1093 26ed12-26ed36 call 246570 1088->1093 1094 26ed38 1088->1094 1089->1088 1092 26eca3-26ecab 1089->1092 1091->1090 1092->1092 1096 26ecad-26ecb0 1092->1096 1098 26ed3d-26ed44 1093->1098 1094->1098 1096->1088 1100 26ecb2-26ecc5 1096->1100 1102 26ed46-26ed4b 1098->1102 1103 26ed57-26ed86 RegQueryValueExW 1098->1103 1100->1088 1102->1103 1104 26ed4d 1102->1104 1105 26edac-26eddb RegQueryValueExW 1103->1105 1106 26ed88-26eda7 call 246570 1103->1106 1104->1103 1107 26eddd-26edec 1105->1107 1108 26ee3a-26ee4d 1105->1108 1106->1105 1111 26edee-26edf9 1107->1111 1112 26ee0f-26ee1d 1107->1112 1113 26ee96-26ee9e 1108->1113 1114 26ee4f-26ee63 call 2b46af 1108->1114 1117 26ee00-26ee0d 1111->1117 1118 26ee1f 1112->1118 1119 26ee2a-26ee35 1112->1119 1115 26eed2 1113->1115 1116 26eea0-26eec4 GetCurrentProcess IsWow64Process 1113->1116 1114->1113 1126 26ee65-26ee93 GetModuleHandleW GetProcAddress call 2b465e 1114->1126 1121 26eed4-26eed9 call 26ef30 1115->1121 1116->1115 1127 26eec6-26eed0 1116->1127 1117->1112 1117->1117 1122 26ee20-26ee28 1118->1122 1119->1108 1121->1087 1122->1119 1122->1122 1126->1113 1127->1121
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows NT\CurrentVersion,00000000,00020119,00000000), ref: 0026EBF8
                                                                      • RegQueryValueExW.KERNELBASE(00000000,CurrentMajorVersionNumber,00000000,00000000,?,?), ref: 0026EC39
                                                                      • RegQueryValueExW.KERNELBASE(00000000,CurrentMinorVersionNumber,00000000,00000000,?,00000004), ref: 0026EC5C
                                                                      • RegQueryValueExW.ADVAPI32(00000000,CurrentVersion,00000000,00000000,?,?), ref: 0026EC8F
                                                                      • RegQueryValueExW.KERNELBASE(00000000,CurrentBuildNumber,00000000,00000000,?,?), ref: 0026ED08
                                                                      • RegQueryValueExW.KERNELBASE(00000000,ReleaseId,00000000,00000000,?,?), ref: 0026ED7E
                                                                      • RegQueryValueExW.KERNELBASE(00000000,CSDVersion,00000000,00000000,?,?), ref: 0026EDD3
                                                                      • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 0026EE73
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0026EE7A
                                                                      • GetCurrentProcess.KERNEL32(?), ref: 0026EEB1
                                                                      • IsWow64Process.KERNEL32 ref: 0026EEC0
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0026EEFA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: QueryValue$Process$AddressCloseCurrentHandleModuleOpenProcWow64
                                                                      • String ID: CSDVersion$CurrentBuildNumber$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$IsWow64Process$ReleaseId$Software\Microsoft\Windows NT\CurrentVersion$kernel32$,1
                                                                      • API String ID: 2654979339-921361743
                                                                      • Opcode ID: c47852cc4f72da2cfcc59ca6ce704d02d7925157e05b7acaaff5a67f304357be
                                                                      • Instruction ID: 8fa86b05672c5fb7f2e2048066e52ba0a89e6b124f6f68e78891e1e9788c1d1a
                                                                      • Opcode Fuzzy Hash: c47852cc4f72da2cfcc59ca6ce704d02d7925157e05b7acaaff5a67f304357be
                                                                      • Instruction Fuzzy Hash: 58A18FB49106299FDF21CF50DC49BEEB7B9FB48711F0042A6E509A7290EB725AE4CF40

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1130 274650-27469b 1131 274c05-274c0a call 243620 1130->1131 1132 2746a1-2746a4 1130->1132 1137 274c0f-274c19 call 243620 1131->1137 1132->1131 1133 2746aa-2746c3 1132->1133 1135 27482c-27484b call 2b43af 1133->1135 1136 2746c9-2746cf call 284e10 1133->1136 1141 2746d4-2746d6 1136->1141 1144 274b4e-274b55 1141->1144 1145 2746dc-2746e6 call 285180 1141->1145 1147 274825 1144->1147 1148 274b5b-274b65 call 2439b0 1144->1148 1145->1144 1152 2746ec-2746f3 1145->1152 1147->1135 1148->1137 1153 274b6b-274b9d call 245060 1148->1153 1154 2746f5-2746f8 1152->1154 1155 2746fa-27470a call 2b5dee 1152->1155 1184 274b9f-274ba1 1153->1184 1185 274bbd-274be3 call 26a750 1153->1185 1156 274716-274725 1154->1156 1164 274711-274714 1155->1164 1165 27470c-27470f 1155->1165 1160 274727-27472a 1156->1160 1161 27472c-27473e call 2b5dee 1156->1161 1162 27474a-274766 1160->1162 1170 274745-274748 1161->1170 1171 274740-274743 1161->1171 1167 2747b8-2747c2 1162->1167 1168 274768-27477c call 2b46af 1162->1168 1164->1156 1165->1156 1174 27484e-274850 1167->1174 1175 2747c8-2747e5 GetCurrentProcess 1167->1175 1182 2747b5 1168->1182 1183 27477e-2747b2 GetModuleHandleW GetProcAddress call 2b465e 1168->1183 1170->1162 1171->1162 1178 274852-274858 1174->1178 1179 2747f8-2747fe 1174->1179 1175->1179 1200 2747e7-2747f0 1175->1200 1178->1131 1186 27485e-27486c 1178->1186 1179->1131 1181 274804-274818 1179->1181 1187 27486e-27487e call 2b5dee 1181->1187 1188 27481a-27481d 1181->1188 1182->1167 1183->1182 1190 274ba4-274bad 1184->1190 1185->1147 1198 274be9-274c00 1185->1198 1186->1135 1204 274885-27488a 1187->1204 1205 274880-274883 1187->1205 1194 27488c-27489b 1188->1194 1190->1190 1196 274baf-274bb8 call 245060 1190->1196 1201 2748a1-2748ab call 2439b0 1194->1201 1202 27495f-274963 1194->1202 1196->1185 1198->1147 1206 2747f2-2747f6 1200->1206 1207 27481f-274823 1200->1207 1201->1137 1217 2748b1-2748e8 call 245060 1201->1217 1209 274965-27496b 1202->1209 1210 274982-2749d7 1202->1210 1204->1194 1205->1194 1206->1147 1206->1179 1207->1147 1207->1179 1209->1131 1214 274971-27497c 1209->1214 1210->1131 1211 2749dd-2749eb 1210->1211 1215 274a07-274a0c 1211->1215 1216 2749ed-274a05 call 287830 1211->1216 1214->1135 1214->1210 1220 274a12-274a15 1215->1220 1221 274a0e-274a10 1215->1221 1216->1215 1217->1131 1236 2748ee-2748f9 1217->1236 1224 274a17-274a1a 1220->1224 1225 274a1c-274a24 1220->1225 1223 274a2b-274a32 1221->1223 1227 274a37-274a3e 1223->1227 1228 274a34 1223->1228 1224->1223 1225->1223 1227->1135 1229 274a44-274a4d call 2439b0 1227->1229 1228->1227 1229->1137 1235 274a53-274a89 call 245060 1229->1235 1235->1131 1250 274a8f-274aa0 1235->1250 1237 27491d-274943 call 26a750 1236->1237 1238 2748fb-274900 1236->1238 1237->1202 1246 274945-27495c 1237->1246 1240 274903-27490c 1238->1240 1240->1240 1242 27490e-274918 call 245060 1240->1242 1242->1237 1246->1202 1251 274aa2 1250->1251 1252 274ae1 1250->1252 1255 274ab7-274abc 1251->1255 1256 274ac5-274aca 1251->1256 1257 274ad3-274ad8 1251->1257 1258 274ab0-274ab5 1251->1258 1259 274abe-274ac3 1251->1259 1260 274acc-274ad1 1251->1260 1261 274ada-274adf 1251->1261 1262 274aa9-274aae 1251->1262 1254 274ae6-274aeb 1252->1254 1263 274af0-274af9 1254->1263 1255->1254 1256->1254 1257->1254 1258->1254 1259->1254 1260->1254 1261->1254 1262->1254 1263->1263 1264 274afb-274b2f call 245060 call 26a750 1263->1264 1264->1135 1269 274b35-274b49 1264->1269 1269->1135
                                                                      APIs
                                                                        • Part of subcall function 00285180: GetSystemDefaultLangID.KERNEL32(2DDDF7D7,00000000,?,?,?,2DDDF7D7), ref: 002851B7
                                                                      • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,?,?,?,00000000,00000000), ref: 0027478F
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00274796
                                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 002747D0
                                                                      Strings
                                                                      • Search result:, xrefs: 00274A76
                                                                      • h1, xrefs: 00274BC0
                                                                      • No acceptable version found. It must be installed from package., xrefs: 00274AB0
                                                                      • IsWow64Process2, xrefs: 00274785
                                                                      • No acceptable version found., xrefs: 00274AD3
                                                                      • No acceptable version found. It is already downloaded and it will be installed., xrefs: 00274ACC
                                                                      • Undefined, xrefs: 00274AE1
                                                                      • Wrong OS or Os language for:, xrefs: 00274B8F
                                                                      • No acceptable version found. It must be downloaded manually from a site., xrefs: 00274ABE
                                                                      • No acceptable version found. It must be downloaded., xrefs: 00274AB7
                                                                      • No acceptable version found. Operating System not supported., xrefs: 00274AC5
                                                                      • h1, xrefs: 00274B0C
                                                                      • Searching for:, xrefs: 002748D5
                                                                      • Not selected for install., xrefs: 00274ADA, 00274AFF, 00274B00
                                                                      • An acceptable version was found., xrefs: 00274AA9
                                                                      • kernel32, xrefs: 0027478A
                                                                      • h1, xrefs: 00274920
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddressCurrentDefaultHandleLangModuleProcProcessSystem
                                                                      • String ID: An acceptable version was found.$IsWow64Process2$No acceptable version found.$No acceptable version found. It is already downloaded and it will be installed.$No acceptable version found. It must be downloaded manually from a site.$No acceptable version found. It must be downloaded.$No acceptable version found. It must be installed from package.$No acceptable version found. Operating System not supported.$Not selected for install.$Search result:$Searching for:$Undefined$Wrong OS or Os language for:$h1$h1$h1$kernel32
                                                                      • API String ID: 323535258-3954559956
                                                                      • Opcode ID: 7450f7442b50b35c9eccde882de167ae8bb0d8edf790f2427e3d0397c19a91c3
                                                                      • Instruction ID: a682b5697ef1bebc5ad35c28b3866c51a71149a9ee0999906e81bcb9fd5f4907
                                                                      • Opcode Fuzzy Hash: 7450f7442b50b35c9eccde882de167ae8bb0d8edf790f2427e3d0397c19a91c3
                                                                      • Instruction Fuzzy Hash: B802E234920609DFCB14EF68C858BAEB7B5FF44310F148219E51AAB391DB70AD61CF81

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1516 244450-2444bc 1517 2444be-2444d2 call 2b46af 1516->1517 1518 2444f9-244500 1516->1518 1517->1518 1525 2444d4-2444f6 call 2b494f call 2b465e 1517->1525 1520 244506 call 264710 1518->1520 1521 244737-244773 call 242040 call 2b43af 1518->1521 1526 24450b-24450d 1520->1526 1525->1518 1529 244656-244668 GetTempPathW 1526->1529 1530 244513-24451e 1526->1530 1533 24466a-24466c 1529->1533 1534 244520 1530->1534 1535 24456a-244578 1530->1535 1533->1521 1540 244672-244699 1533->1540 1541 244525-244534 call 2b46af 1534->1541 1537 24458e-2445b2 GetWindowsDirectoryW call 2b9b95 1535->1537 1538 24457a-24458c 1535->1538 1552 2445b5-2445c4 PathFileExistsW 1537->1552 1538->1552 1545 2446a0-2446a9 1540->1545 1541->1535 1546 244536-244567 GetModuleHandleW GetProcAddress call 2b465e 1541->1546 1545->1545 1549 2446ab-2446e7 call 243c00 call 246bc0 1545->1549 1546->1535 1562 2446e9-2446fe 1549->1562 1563 24471a-244730 1549->1563 1552->1533 1556 2445ca-24460f call 264920 call 264b10 * 2 call 265090 1552->1556 1578 244645-244654 call 2649c0 1556->1578 1579 244611-24463f CreateDirectoryW 1556->1579 1565 244710-244717 call 2b43bd 1562->1565 1566 244700-24470e 1562->1566 1563->1521 1565->1563 1566->1565 1568 244774-244849 call 2b98af call 244450 call 242040 call 2443b0 call 244850 call 2443b0 call 2b43af 1566->1568 1578->1533 1579->1578
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(Kernel32.dll,GetTempPath2W), ref: 00244547
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0024454E
                                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104,2DDDF7D7,00000000), ref: 00244594
                                                                      • PathFileExistsW.SHLWAPI(?), ref: 002445BC
                                                                      • CreateDirectoryW.KERNEL32(?,?,S-1-5-32-544,?,00000001,S-1-5-18,?,00000001), ref: 0024463F
                                                                        • Part of subcall function 002B46AF: AcquireSRWLockExclusive.KERNEL32(0030FFB8,?,?,?,00243A56,00310848,2DDDF7D7,?,?,002D516D,000000FF,?,002810B6,2DDDF7D7,?), ref: 002B46BA
                                                                        • Part of subcall function 002B46AF: ReleaseSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243A56,00310848,2DDDF7D7,?,?,002D516D,000000FF,?,002810B6,2DDDF7D7,?), ref: 002B46F4
                                                                      • GetTempPathW.KERNEL32(00000104,?,2DDDF7D7,00000000), ref: 00244662
                                                                        • Part of subcall function 002B465E: AcquireSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243AC7,00310848,002E6460), ref: 002B4668
                                                                        • Part of subcall function 002B465E: ReleaseSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243AC7,00310848,002E6460), ref: 002B469B
                                                                        • Part of subcall function 002B465E: WakeAllConditionVariable.KERNEL32(0030FFB4,?,?,00243AC7,00310848,002E6460), ref: 002B46A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExclusiveLock$AcquireDirectoryPathRelease$AddressConditionCreateExistsFileHandleModuleProcTempVariableWakeWindows
                                                                      • String ID: 0$GetTempPath2W$Kernel32.dll$S-1-5-18$S-1-5-32-544$URL$\SystemTemp\
                                                                      • API String ID: 3143601600-938883808
                                                                      • Opcode ID: 1a708b7d226706cb004689f70634c3fe0d41e29bcce0b7a649c82aacf3390a2c
                                                                      • Instruction ID: 8970f9f4ef085aff94cd8b8010a89b843157d6c36e50b4fa75a28422cc2b6c73
                                                                      • Opcode Fuzzy Hash: 1a708b7d226706cb004689f70634c3fe0d41e29bcce0b7a649c82aacf3390a2c
                                                                      • Instruction Fuzzy Hash: 80B1F5B1D10218EBDB14EFA4DC89BDEB7B8EF09310F1042A9E509A7281DB746E54CF91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1593 27a610-27a641 1594 27a647-27a661 GetActiveWindow 1593->1594 1595 27a7be-27a7cf 1593->1595 1596 27a663-27a665 call 27ba50 1594->1596 1597 27a66f-27a677 1594->1597 1601 27a66a KiUserCallbackDispatcher 1596->1601 1599 27a692-27a6a1 call 2b202c 1597->1599 1600 27a679-27a683 call 2b1f2a 1597->1600 1607 27a6a7-27a70c GetCurrentThreadId EnterCriticalSection LeaveCriticalSection CreateDialogParamW 1599->1607 1608 27a7d2-27a837 call 25fae0 call 27aa70 1599->1608 1600->1599 1606 27a685-27a68d SetLastError 1600->1606 1601->1597 1609 27a712-27a729 GetCurrentThreadId 1606->1609 1607->1609 1621 27a84d-27a86c call 25e820 1608->1621 1622 27a839-27a849 1608->1622 1613 27a72b-27a732 1609->1613 1614 27a799-27a7b8 SetWindowTextW GetDlgItem SetWindowTextW 1609->1614 1616 27a745-27a780 call 269b20 call 259d40 1613->1616 1617 27a734-27a740 call 24c850 call 26f8e0 1613->1617 1614->1595 1616->1614 1631 27a782-27a796 1616->1631 1617->1616 1622->1621 1631->1614
                                                                      APIs
                                                                      • GetActiveWindow.USER32 ref: 0027A64A
                                                                      • SetLastError.KERNEL32(0000000E), ref: 0027A687
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0027A712
                                                                      • SetWindowTextW.USER32(?,00000000), ref: 0027A79E
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 0027A7AC
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 0027A7B8
                                                                        • Part of subcall function 0027BA50: GetDlgItem.USER32(?,00000002), ref: 0027BA6D
                                                                        • Part of subcall function 0027BA50: GetWindowRect.USER32(00000000,?), ref: 0027BA83
                                                                        • Part of subcall function 0027BA50: ShowWindow.USER32(00000000,00000000,?,?,?,?,0027A66A), ref: 0027BA98
                                                                        • Part of subcall function 0027BA50: InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,0027A66A), ref: 0027BAA3
                                                                        • Part of subcall function 0027BA50: GetDlgItem.USER32(?,000003E9), ref: 0027BAB1
                                                                        • Part of subcall function 0027BA50: GetWindowRect.USER32(00000000,?), ref: 0027BAC7
                                                                        • Part of subcall function 0027BA50: SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,0027A66A), ref: 0027BB06
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ItemRect$Text$ActiveCurrentErrorInvalidateLastShowThread
                                                                      • String ID: \,1
                                                                      • API String ID: 2012338523-4060636498
                                                                      • Opcode ID: 39a6ef230267174e5f8a7f3a73f8e6a3d1b0bd9a6eabf27818de6f475a9cda8c
                                                                      • Instruction ID: 388241b4c02d7698be011bf629cfb20ded0bbaea4fff24973d4daaa7a68e08f2
                                                                      • Opcode Fuzzy Hash: 39a6ef230267174e5f8a7f3a73f8e6a3d1b0bd9a6eabf27818de6f475a9cda8c
                                                                      • Instruction Fuzzy Hash: 2471EE30A14745DFDB15DF68EC88B9EBBB8FF48720F108669E8199B291D770A910CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1656 2b1934-2b199f call 2b1608 1659 2b19a1-2b19c0 call 2b1894 RaiseException 1656->1659 1660 2b19c5-2b19e8 1656->1660 1669 2b1ba4-2b1ba8 1659->1669 1662 2b19ea 1660->1662 1663 2b19ed-2b19fa 1660->1663 1662->1663 1665 2b1a1b-2b1a1d 1663->1665 1666 2b19fc-2b1a0f 1663->1666 1667 2b1a23-2b1a25 1665->1667 1668 2b1ab6-2b1abb 1665->1668 1692 2b1b79-2b1b81 1666->1692 1693 2b1a15 1666->1693 1670 2b1a3d-2b1a4e LoadLibraryExA 1667->1670 1671 2b1a27-2b1a3b 1667->1671 1672 2b1acf-2b1ad1 1668->1672 1673 2b1abd-2b1acd 1668->1673 1675 2b1a9e-2b1aa7 1670->1675 1676 2b1a50-2b1a61 GetLastError 1670->1676 1671->1670 1671->1675 1677 2b1b6c-2b1b74 call 2b15aa 1672->1677 1678 2b1ad7-2b1adf 1672->1678 1673->1672 1679 2b1aa9-2b1aaa FreeLibrary 1675->1679 1680 2b1ab0 1675->1680 1683 2b1a79-2b1a99 call 2b1894 RaiseException 1676->1683 1684 2b1a63-2b1a77 1676->1684 1677->1692 1685 2b1b0e-2b1b1c GetProcAddress 1678->1685 1686 2b1ae1-2b1ae4 1678->1686 1679->1680 1680->1668 1683->1669 1684->1675 1684->1683 1685->1677 1689 2b1b1e-2b1b2f GetLastError 1685->1689 1686->1685 1690 2b1ae6-2b1af0 1686->1690 1694 2b1b31-2b1b45 1689->1694 1695 2b1b47-2b1b69 call 2b1894 RaiseException call 2b1608 1689->1695 1690->1685 1699 2b1af2-2b1af9 1690->1699 1701 2b1b9d-2b1ba2 call 2b1894 1692->1701 1702 2b1b83-2b1b9b 1692->1702 1693->1665 1694->1677 1694->1695 1695->1677 1699->1685 1705 2b1afb-2b1aff 1699->1705 1701->1669 1702->1701 1705->1685 1711 2b1b01-2b1b0c 1705->1711 1711->1677 1711->1685
                                                                      APIs
                                                                      • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002B19B8
                                                                      • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 002B1A44
                                                                      • GetLastError.KERNEL32 ref: 002B1A50
                                                                      • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 002B1A90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionRaise$ErrorLastLibraryLoad
                                                                      • String ID: $
                                                                      • API String ID: 948315288-3993045852
                                                                      • Opcode ID: 2919bafcffe2fc5e6fc03327e99089bdd1d60acdc8a7e92b8c89b1d540cd93f6
                                                                      • Instruction ID: 15b435fc07ed1d3e5cca425a8d27f955f4c5ad47ae0045b649ccb7c32376c91c
                                                                      • Opcode Fuzzy Hash: 2919bafcffe2fc5e6fc03327e99089bdd1d60acdc8a7e92b8c89b1d540cd93f6
                                                                      • Instruction Fuzzy Hash: 04819071D1120AAFDB11CF94D898AEEB7B9FF54394F55402AE904AB350DB70DD21CB90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1970 27aa70-27aab5 1971 27aab7-27aab9 1970->1971 1972 27aabe-27ab15 call 27af10 call 27b130 call 244450 call 2469b0 1970->1972 1973 27aed6-27aef8 call 2b43af 1971->1973 1984 27ab17 1972->1984 1985 27ab19-27ab22 call 2439b0 1972->1985 1984->1985 1988 27aef9-27af03 call 243620 1985->1988 1989 27ab28-27ab45 1985->1989 1994 27ab47-27ab4d 1989->1994 1995 27ab73 1989->1995 1997 27ab4f-27ab5b call 245350 1994->1997 1998 27ab5d-27ab5f 1994->1998 1996 27ab75-27ab7a call 245680 1995->1996 2003 27ab7f-27aba8 call 2443b0 * 2 call 2661e0 call 2439b0 1996->2003 1997->2003 1999 27ab62-27ab6b 1998->1999 1999->1999 2002 27ab6d-27ab71 1999->2002 2002->1996 2003->1988 2013 27abae-27abe2 GetTempFileNameW 2003->2013 2016 27acca-27acd3 call 2439b0 2013->2016 2017 27abe8-27abee 2013->2017 2016->1988 2022 27acd9-27ad1b call 259d40 call 2439b0 2016->2022 2019 27abf0-27abf9 2017->2019 2019->2019 2021 27abfb-27ac15 call 245680 DeleteFileW call 2439b0 2019->2021 2027 27ac1a-27ac1e 2021->2027 2022->1988 2036 27ad21-27ad66 call 259d40 CopyFileW 2022->2036 2027->1988 2029 27ac24-27ac4c 2027->2029 2037 27ac4e-27ac57 call 245350 2029->2037 2038 27ac59-27ac60 call 245680 2029->2038 2053 27adfc 2036->2053 2054 27ad6c-27adba call 266400 call 27a920 call 28e3a0 2036->2054 2042 27ac65-27ac7d call 2b5d4b 2037->2042 2038->2042 2048 27aca3-27acb4 2042->2048 2049 27ac7f-27ac86 2042->2049 2048->2016 2052 27acb6-27acc6 2048->2052 2049->2048 2051 27ac88-27ac9e call 25e730 call 245060 2049->2051 2051->2048 2052->2016 2057 27ae00-27ae14 2053->2057 2080 27add0-27ade4 2054->2080 2081 27adbc-27adcc 2054->2081 2061 27ae16-27ae26 2057->2061 2062 27ae2a-27ae3e 2057->2062 2061->2062 2065 27ae54-27ae68 2062->2065 2066 27ae40-27ae50 2062->2066 2067 27ae7e-27ae92 2065->2067 2068 27ae6a-27ae7a 2065->2068 2066->2065 2071 27ae94-27aea4 2067->2071 2072 27aea8-27aebd 2067->2072 2068->2067 2071->2072 2077 27aed3 2072->2077 2078 27aebf-27aecf 2072->2078 2077->1973 2078->2077 2080->2057 2082 27ade6-27adfa 2080->2082 2081->2080 2082->2057
                                                                      APIs
                                                                      • GetTempFileNameW.KERNELBASE(?,AI_,00000000,?,?,?,?,?,?,?,?,?,?,002DF0F5,000000FF), ref: 0027ABD7
                                                                      • DeleteFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,002DF0F5,000000FF), ref: 0027AC0F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$DeleteNameTemp
                                                                      • String ID: %s -paths %s -retry_count %d$-NoProfile -NonInteractive -NoLogo -ExecutionPolicy %s -Command "%s"$.ps1$AI_$RemoteSigned
                                                                      • API String ID: 1648863064-656004915
                                                                      • Opcode ID: c307b0df97e956ef6dbe5a05d48bce557555b599cc2c2beaaa2d67c75cb3d96e
                                                                      • Instruction ID: 0e65399b5315e5a6d55b3346e14cd9a27df28edbc4ecd1ce6f8d63b968fb3aa2
                                                                      • Opcode Fuzzy Hash: c307b0df97e956ef6dbe5a05d48bce557555b599cc2c2beaaa2d67c75cb3d96e
                                                                      • Instruction Fuzzy Hash: F0E10631A10649DFCB05DF68CC58AAEBBB5EF88320F188169E415A7391DB74AE11CF91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 2097 2b1cbc-2b1cc7 2098 2b1cc9-2b1cd5 DecodePointer 2097->2098 2099 2b1cd6-2b1ced LoadLibraryExA 2097->2099 2100 2b1cef-2b1d04 call 2b1d6c 2099->2100 2101 2b1d67 2099->2101 2100->2101 2105 2b1d06-2b1d1b call 2b1d6c 2100->2105 2102 2b1d69-2b1d6b 2101->2102 2105->2101 2108 2b1d1d-2b1d32 call 2b1d6c 2105->2108 2108->2101 2111 2b1d34-2b1d49 call 2b1d6c 2108->2111 2111->2101 2114 2b1d4b-2b1d65 DecodePointer 2111->2114 2114->2102
                                                                      APIs
                                                                      • DecodePointer.KERNEL32(?,?,?,002B2002,0030F82C,?,?,?,0028D485,00000000,2DDDF7D7,?), ref: 002B1CCE
                                                                      • LoadLibraryExA.KERNELBASE(atlthunk.dll,00000000,00000800,?,?,?,002B2002,0030F82C,?,?,?,0028D485,00000000,2DDDF7D7,?), ref: 002B1CE3
                                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 002B1D5F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: DecodePointer$LibraryLoad
                                                                      • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
                                                                      • API String ID: 1423960858-1745123996
                                                                      • Opcode ID: 6696204797d9d822295a7b1cdfd3593b8a89e3742b00fc1d7dacd391eefd8928
                                                                      • Instruction ID: 59fb628fbb3dea3cc675704bb2801fec5f62a16ac355e010e6b2ac427cdd4a5c
                                                                      • Opcode Fuzzy Hash: 6696204797d9d822295a7b1cdfd3593b8a89e3742b00fc1d7dacd391eefd8928
                                                                      • Instruction Fuzzy Hash: 9B01D2306B13567FCE32AB20AC27BD93B989B03B94FC40061FC446A2D6D7A19939C6C5
                                                                      APIs
                                                                      • GetFileVersionInfoSizeW.KERNELBASE(?,?,2DDDF7D7,00000000,?,?,00000000,002DCCC5,000000FF,?,0027A745), ref: 0026F945
                                                                      • GetFileVersionInfoW.KERNELBASE(?,?,00000000,0027A745,00000000,?,00000000,002DCCC5,000000FF,?,0027A745), ref: 0026F993
                                                                      • VerQueryValueW.VERSION(0027A745,\VarFileInfo\Translation,002DCCC5,000000FF,?,00000000,002DCCC5,000000FF,?,0027A745), ref: 0026F9DB
                                                                      • VerQueryValueW.VERSION(0027A745,?,?,00000000,?,?,?,?,?,00000000,002DCCC5,000000FF,?,0027A745), ref: 0026FA3A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: FileInfoQueryValueVersion$Size
                                                                      • String ID: ProductName$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
                                                                      • API String ID: 2099394744-2149928195
                                                                      • Opcode ID: 9f80ffea79c66e8d5f9101d1fbd25b8d7d34a440fb8afa546c3e6e903338d7a6
                                                                      • Instruction ID: 15f52f1b76666d3a84799724d81cc219896e7e66e20e830f7eef5b40d7cb6abf
                                                                      • Opcode Fuzzy Hash: 9f80ffea79c66e8d5f9101d1fbd25b8d7d34a440fb8afa546c3e6e903338d7a6
                                                                      • Instruction Fuzzy Hash: 7071E231A1064ADFCF04DFA8D988AAEBBB8FF05314F144169E916A7391DB309D55CFA0
                                                                      APIs
                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 00267D54
                                                                      • GetLastError.KERNEL32 ref: 00267D65
                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00267D7B
                                                                      • GetExitCodeProcess.KERNELBASE(00000000,00000000), ref: 00267D8C
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00267D9A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCodeErrorExecuteExitHandleLastObjectProcessShellSingleWait
                                                                      • String ID: N/
                                                                      • API String ID: 1481985272-555404110
                                                                      • Opcode ID: 77ed4d5180d782a20616ec10996795c9495b9f804fbd5477e4a56e983b065381
                                                                      • Instruction ID: e44b46482f5e15cdddc946d4521b8fdc171dfdf1b2897e1eec4d00a47a4de1d3
                                                                      • Opcode Fuzzy Hash: 77ed4d5180d782a20616ec10996795c9495b9f804fbd5477e4a56e983b065381
                                                                      • Instruction Fuzzy Hash: F461AE70A1464A8FDB04CFA8D8487ADBBB4FF49328F148259E825A73D0DB74AD41CF90
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,00000002), ref: 0027BA6D
                                                                      • GetWindowRect.USER32(00000000,?), ref: 0027BA83
                                                                      • ShowWindow.USER32(00000000,00000000,?,?,?,?,0027A66A), ref: 0027BA98
                                                                      • InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,0027A66A), ref: 0027BAA3
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 0027BAB1
                                                                      • GetWindowRect.USER32(00000000,?), ref: 0027BAC7
                                                                      • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,0027A66A), ref: 0027BB06
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rect$Item$InvalidateShow
                                                                      • String ID:
                                                                      • API String ID: 2147159307-0
                                                                      • Opcode ID: 32082e1201310567aa31416d0f17f63c7ea1fdc66d81837c9abcc74fdd5cea15
                                                                      • Instruction ID: 05ac6aabd81a1deaa50e8087e0c5f2d0ffc6dd70558aaf2531f2203e4a97996f
                                                                      • Opcode Fuzzy Hash: 32082e1201310567aa31416d0f17f63c7ea1fdc66d81837c9abcc74fdd5cea15
                                                                      • Instruction Fuzzy Hash: DF21AF71658301AFE300DF34ED89BABBBE8EF89700F008659F855D6590E770AD508B92
                                                                      APIs
                                                                      • EndDialog.USER32 ref: 0028411A
                                                                        • Part of subcall function 0028CA00: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0028CA3E
                                                                        • Part of subcall function 0028CA00: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0028CA4D
                                                                        • Part of subcall function 0027BEA0: GetWindowLongW.USER32(?,000000F0), ref: 0027BEE7
                                                                        • Part of subcall function 0027BEA0: GetParent.USER32(00000000), ref: 0027BEFA
                                                                        • Part of subcall function 0027BEA0: GetWindowRect.USER32(?,80004055), ref: 0027BF13
                                                                        • Part of subcall function 0027BEA0: GetWindowLongW.USER32(00000000,000000F0), ref: 0027BF26
                                                                        • Part of subcall function 0027BEA0: MonitorFromWindow.USER32(?,00000002), ref: 0027BF3E
                                                                        • Part of subcall function 0027BEA0: GetMonitorInfoW.USER32(00000000,8000402D), ref: 0027BF54
                                                                      • SetWindowTextW.USER32(?,?), ref: 00284031
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                        • Part of subcall function 00245350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0025E648,-00000010), ref: 00245373
                                                                      • GetDlgItem.USER32(00000001,0000040A), ref: 0028407B
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00284086
                                                                        • Part of subcall function 00294D20: GetWindowLongW.USER32(?,000000F0), ref: 00294D35
                                                                        • Part of subcall function 00294D20: GetParent.USER32(?), ref: 00294D43
                                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_000444A0,?,00000000,?), ref: 002840AA
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$MessageMonitorParentSendText$CreateDialogFindFromHeapInfoItemProcessRectResourceThread
                                                                      • String ID:
                                                                      • API String ID: 758803202-0
                                                                      • Opcode ID: e7b5d0cf08fb1152301b81c5ce56bb0fa1ec6b6666cc63fa01f32ac716b8cd5c
                                                                      • Instruction ID: b150a9d61ec3d4bacdf944037afd8792083eec808afd5e338851f4921b6584e9
                                                                      • Opcode Fuzzy Hash: e7b5d0cf08fb1152301b81c5ce56bb0fa1ec6b6666cc63fa01f32ac716b8cd5c
                                                                      • Instruction Fuzzy Hash: F251F536A1460AAFD700EF58EC45B99BBA4FB18320F00416AED15D77D0DB71A860CFD0
                                                                      APIs
                                                                      • MsgWaitForMultipleObjectsEx.USER32(00000001,000000FF,000000FF,000005FF,00000004), ref: 00267A17
                                                                      • PeekMessageW.USER32(?,00000000), ref: 00267A48
                                                                      • TranslateMessage.USER32(00000000), ref: 00267A57
                                                                      • DispatchMessageW.USER32(00000000), ref: 00267A62
                                                                      • MsgWaitForMultipleObjectsEx.USER32(00000001,00000000,000000FF,000005FF,00000004), ref: 00267A78
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Message$MultipleObjectsWait$DispatchPeekTranslate
                                                                      • String ID:
                                                                      • API String ID: 4084795276-0
                                                                      • Opcode ID: 74463faaa249b82b7fa04f28499bab67e1418a7210f4ddbe9697eb6436d07fe9
                                                                      • Instruction ID: 25970d334eab7841958e46f42e95bfc4ba35aa884ad23629b24cf8bfb9ed2fd8
                                                                      • Opcode Fuzzy Hash: 74463faaa249b82b7fa04f28499bab67e1418a7210f4ddbe9697eb6436d07fe9
                                                                      • Instruction Fuzzy Hash: B801D470A883027FE710CFA1EC89B7B77ECAB58B14F544629BA64D51C0F774DA848B52
                                                                      APIs
                                                                      • SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?,2DDDF7D7,?,00000000,?,002DEFEE,000000FF), ref: 0027A975
                                                                      • PathAppendW.SHLWAPI(00000000,WindowsPowerShell\v1.0\powershell.exe), ref: 0027A98C
                                                                      • PathFileExistsW.KERNELBASE(00000000), ref: 0027A99A
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                        • Part of subcall function 00245350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0025E648,-00000010), ref: 00245373
                                                                      Strings
                                                                      • WindowsPowerShell\v1.0\powershell.exe, xrefs: 0027A983
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Path$AppendExistsFileFindFolderHeapProcessResource
                                                                      • String ID: WindowsPowerShell\v1.0\powershell.exe
                                                                      • API String ID: 2424349261-2665178159
                                                                      • Opcode ID: 374e5e25d3dca721a6ee901ae59e18bafb75bf28f1756af9451941fba9492cb4
                                                                      • Instruction ID: 64a0a2f9bcca3b10c5fea9573c5d951a0515196e8b938048838f24e030f51262
                                                                      • Opcode Fuzzy Hash: 374e5e25d3dca721a6ee901ae59e18bafb75bf28f1756af9451941fba9492cb4
                                                                      • Instruction Fuzzy Hash: 2C51F571610249DFCB24DF64DC89BEE77B8FB48710F10852AE90ADB381EB74AA14CB51
                                                                      APIs
                                                                      • VirtualProtect.KERNELBASE(00317000,00000080,00000004,00000000,?,?,002C7268,0000001A,AppPolicyGetProcessTerminationMethod,002ED708,AppPolicyGetProcessTerminationMethod,00000000,?,002C986F,00000000), ref: 002C7176
                                                                      • VirtualProtect.KERNELBASE(00317000,00000080,00000002,00000000,?,?,002C7268,0000001A,AppPolicyGetProcessTerminationMethod,002ED708,AppPolicyGetProcessTerminationMethod,00000000,?,002C986F,00000000), ref: 002C719E
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,002C7268,0000001A,AppPolicyGetProcessTerminationMethod,002ED708,AppPolicyGetProcessTerminationMethod,00000000,?,002C986F,00000000), ref: 002C71C0
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 002C71CA
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual$AddressFreeLibraryProc
                                                                      • String ID:
                                                                      • API String ID: 3998452802-0
                                                                      • Opcode ID: 669ead2da76c3d0fb20eeff0a3c93bed16b5c086b2b69acb2d30f342f093f30d
                                                                      • Instruction ID: 65565eaa6b45896a2ef810a77da2e84d42eb793f25eaf6ba4acfa48d50de0bab
                                                                      • Opcode Fuzzy Hash: 669ead2da76c3d0fb20eeff0a3c93bed16b5c086b2b69acb2d30f342f093f30d
                                                                      • Instruction Fuzzy Hash: DF210D326182556BDB268F69EC85F5A3768EF01770F28032EFD199B180DAA0DD11CE90
                                                                      APIs
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0027B9E9
                                                                      • DestroyWindow.USER32(?), ref: 0027B9F8
                                                                      • PostMessageW.USER32(?,00000401,00000000,00000000), ref: 0027BA15
                                                                      • IsWindow.USER32(?), ref: 0027BA23
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CurrentDestroyMessagePostThread
                                                                      • String ID:
                                                                      • API String ID: 3186974096-0
                                                                      • Opcode ID: 31726b115e9d8bad10f4b0200bd17ab5435ead7b67195226b4320553b5022f81
                                                                      • Instruction ID: d4493d41be551d6fd58376bb24148cef15e3f8f505c99d428f3be2d06fe6906d
                                                                      • Opcode Fuzzy Hash: 31726b115e9d8bad10f4b0200bd17ab5435ead7b67195226b4320553b5022f81
                                                                      • Instruction Fuzzy Hash: BCF082300657809FD771AF24FE4CB53BBD17B08B00F44988CE48A8A990C770F840CB54
                                                                      APIs
                                                                      • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,2DDDF7D7), ref: 002804E0
                                                                      • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00280528
                                                                      • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,0000000C,?), ref: 00280579
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Open$InfoQuery
                                                                      • String ID:
                                                                      • API String ID: 223210943-0
                                                                      • Opcode ID: fe0d1460227b8d4f4688b32bb7a43f59b6f2ead197632402d12d7b54d0bbddb9
                                                                      • Instruction ID: 5062a4ff43a7ba8ffe55d6834a45e8c8304a54f05ebddfac69c20aa3242733bc
                                                                      • Opcode Fuzzy Hash: fe0d1460227b8d4f4688b32bb7a43f59b6f2ead197632402d12d7b54d0bbddb9
                                                                      • Instruction Fuzzy Hash: 6E218275A44609EFEB10DF94DC41FA9FBB8FB08720F10416AF615A72C0D7B16914CBA1
                                                                      APIs
                                                                      • CoInitialize.OLE32(00000000), ref: 0025F6B7
                                                                      • DefWindowProcW.USER32(00000000,00000000,00000000,00000000,?,?,?,?,002DA415,000000FF), ref: 0025F6D2
                                                                        • Part of subcall function 0025F980: GetCurrentThreadId.KERNEL32 ref: 0025F9E5
                                                                        • Part of subcall function 0025F7F0: EnterCriticalSection.KERNEL32(00310A1C,2DDDF7D7), ref: 0025F82F
                                                                        • Part of subcall function 0025F7F0: DestroyWindow.USER32(00000000), ref: 0025F84D
                                                                        • Part of subcall function 0025F7F0: LeaveCriticalSection.KERNEL32(00310A1C), ref: 0025F896
                                                                      • CoUninitialize.COMBASE ref: 0025F715
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSectionWindow$CurrentDestroyEnterInitializeLeaveProcThreadUninitialize
                                                                      • String ID:
                                                                      • API String ID: 2072714735-0
                                                                      • Opcode ID: 94d025f6523991c6ca2b2a92426d9a3fdbdd42cb0429248fc04b1f760d00a4db
                                                                      • Instruction ID: ee657fe7af5a012ddae3d8bf4714ba96f080b906ef3a716508cb1e1067e711ad
                                                                      • Opcode Fuzzy Hash: 94d025f6523991c6ca2b2a92426d9a3fdbdd42cb0429248fc04b1f760d00a4db
                                                                      • Instruction Fuzzy Hash: 0A11E231665288BFEB20EF68DD05BDDBB78EF05710F104199FC199B2C1DB701618CA56
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,0000040B), ref: 0028429D
                                                                      • SendMessageW.USER32(00000000,00000401,00000000), ref: 002842B8
                                                                      • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 002842C8
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Item
                                                                      • String ID:
                                                                      • API String ID: 3888421826-0
                                                                      • Opcode ID: 6015cd2555b180452016ea2114945cf59c5ca8d729613c1a6c0736001c452574
                                                                      • Instruction ID: b3b6958c56b6a6661df2a2bc10c6e33443ceb88f15d9e40aaf8b190bbc2b01b4
                                                                      • Opcode Fuzzy Hash: 6015cd2555b180452016ea2114945cf59c5ca8d729613c1a6c0736001c452574
                                                                      • Instruction Fuzzy Hash: 76F06CB12443106FF7509F15AC8DF567799EF88710F218055F700AD2D5C3F558019B68
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(?,?,002C419D,?,?,002B96A2), ref: 002C41B1
                                                                      • TerminateProcess.KERNEL32(00000000,?,002C419D,?,?,002B96A2), ref: 002C41B8
                                                                      • ExitProcess.KERNEL32 ref: 002C41CA
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentExitTerminate
                                                                      • String ID:
                                                                      • API String ID: 1703294689-0
                                                                      • Opcode ID: f04c46dc1bdd455dea8f6b5098aaacb654a486fb26a3ebca847de882214782b3
                                                                      • Instruction ID: 0a5c4b728cb4dd046eead6ae149b0dafa9d79a6384347ae5294d02a60037adc3
                                                                      • Opcode Fuzzy Hash: f04c46dc1bdd455dea8f6b5098aaacb654a486fb26a3ebca847de882214782b3
                                                                      • Instruction Fuzzy Hash: 5AD09E71058288BBDF062F65ED4DA993F65EB40351F048054BA4D4D471CB7599E2DF40
                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,00000000,?), ref: 0027BC0E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID: $
                                                                      • API String ID: 1378638983-3993045852
                                                                      • Opcode ID: 3a02b4fcde62d0215f979d8eca75ab4fe6249f4ffe5adf7d81c55633df6d99cd
                                                                      • Instruction ID: 20f1bc8967a808cce19120cc7928f28f77e0383b313dffb9e14e0af09cc07749
                                                                      • Opcode Fuzzy Hash: 3a02b4fcde62d0215f979d8eca75ab4fe6249f4ffe5adf7d81c55633df6d99cd
                                                                      • Instruction Fuzzy Hash: 453136716183499FDB12CF19D888B6ABBF4FB88714F14881EF9488B2A0C775DD548B92
                                                                      APIs
                                                                      • RegEnumValueA.KERNELBASE(?,?,?,?,00000000,?,00000000,?,2DDDF7D7), ref: 002806C8
                                                                      • RegEnumValueA.ADVAPI32(?,?,?,?,00000000,?,?,?,?), ref: 002806F8
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                        • Part of subcall function 0024CB10: FindResourceW.KERNEL32(00000000,00000100,00000006,00000000,000000FF,?,00000000,0027A070,000000FF,?,?,?,2DDDF7D7,00000000,?,000000FF), ref: 0024CB4D
                                                                        • Part of subcall function 0024CB10: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,?,2DDDF7D7,00000000,?,000000FF), ref: 0024CB7E
                                                                        • Part of subcall function 0024CB10: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,?,?,00000000,00000000,00000000,?,?,?,2DDDF7D7,00000000,?,000000FF,000000FF), ref: 0024CBB5
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharEnumMultiValueWide$FindHeapProcessResource
                                                                      • String ID:
                                                                      • API String ID: 4070800961-0
                                                                      • Opcode ID: 95f45cdd6c8ce600f395f37f0e95b6579d276db1c42fd650f9aba011212fce51
                                                                      • Instruction ID: f562c29bdf8d56b07b001d82156ae41973707307e5cfa351ccebb7b021323b14
                                                                      • Opcode Fuzzy Hash: 95f45cdd6c8ce600f395f37f0e95b6579d276db1c42fd650f9aba011212fce51
                                                                      • Instruction Fuzzy Hash: 05B1D375A00649DFDB04DF58C884BAEBBB9FF48320F144169E915AB391DB34AE05CFA1
                                                                      APIs
                                                                      • IsWindow.USER32(00000000), ref: 0028D512
                                                                      • EndDialog.USER32(00000000,00000001), ref: 0028D521
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: DialogWindow
                                                                      • String ID:
                                                                      • API String ID: 2634769047-0
                                                                      • Opcode ID: bef9cc10fb63d379db210b084317cb45da15899c07c8e788d9418969e74343dc
                                                                      • Instruction ID: ec19aa0e8af3deab1094b8ce95b5a35bac3c6c8c1e06fad83db69f5bd339e31e
                                                                      • Opcode Fuzzy Hash: bef9cc10fb63d379db210b084317cb45da15899c07c8e788d9418969e74343dc
                                                                      • Instruction Fuzzy Hash: F561AD34A02645DFCB05DF68C94876CBBB4FF09324F1582A9E819AB3D1DB749E05CB91
                                                                      APIs
                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 00267D54
                                                                      • GetLastError.KERNEL32 ref: 00267D65
                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00267D7B
                                                                      • GetExitCodeProcess.KERNELBASE(00000000,00000000), ref: 00267D8C
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00267D9A
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCodeErrorExecuteExitHandleLastObjectProcessShellSingleWait
                                                                      • String ID:
                                                                      • API String ID: 1481985272-0
                                                                      • Opcode ID: efec1f0ef4d8596504f2535fd5396961d194ad3b527bffcdda0c797225302435
                                                                      • Instruction ID: 26c4045b3b10f85522671b294d0862f3fe864616824532fa1d9669f6e8b7d521
                                                                      • Opcode Fuzzy Hash: efec1f0ef4d8596504f2535fd5396961d194ad3b527bffcdda0c797225302435
                                                                      • Instruction Fuzzy Hash: 9041A031A05A468FDB15CF68D85826DBBB0FF45334F288759E825AB3D1DB34AD41CB90
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID: Ts/
                                                                      • API String ID: 2962429428-993478674
                                                                      • Opcode ID: dcfed630f9bba46b7964528cabd03caf2616a9b40f37cf63cd81dd87499ce440
                                                                      • Instruction ID: af961677bca6d153f4d07f9e09e983adb5cedd8a9fc47681ac24f24e0e76a50d
                                                                      • Opcode Fuzzy Hash: dcfed630f9bba46b7964528cabd03caf2616a9b40f37cf63cd81dd87499ce440
                                                                      • Instruction Fuzzy Hash: 7D21B070A09246EFCB14DFA9D988B5ABBB8FF04724F1402AAE815D73D0D770A914CB91
                                                                      APIs
                                                                      • EnableWindow.USER32(?,00000000), ref: 0027B7F1
                                                                        • Part of subcall function 0028CA00: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0028CA3E
                                                                        • Part of subcall function 0028CA00: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0028CA4D
                                                                        • Part of subcall function 0027BA50: GetDlgItem.USER32(?,00000002), ref: 0027BA6D
                                                                        • Part of subcall function 0027BA50: GetWindowRect.USER32(00000000,?), ref: 0027BA83
                                                                        • Part of subcall function 0027BA50: ShowWindow.USER32(00000000,00000000,?,?,?,?,0027A66A), ref: 0027BA98
                                                                        • Part of subcall function 0027BA50: InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,0027A66A), ref: 0027BAA3
                                                                        • Part of subcall function 0027BA50: GetDlgItem.USER32(?,000003E9), ref: 0027BAB1
                                                                        • Part of subcall function 0027BA50: GetWindowRect.USER32(00000000,?), ref: 0027BAC7
                                                                        • Part of subcall function 0027BA50: SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,0027A66A), ref: 0027BB06
                                                                        • Part of subcall function 0027BEA0: GetWindowLongW.USER32(?,000000F0), ref: 0027BEE7
                                                                        • Part of subcall function 0027BEA0: GetParent.USER32(00000000), ref: 0027BEFA
                                                                        • Part of subcall function 0027BEA0: GetWindowRect.USER32(?,80004055), ref: 0027BF13
                                                                        • Part of subcall function 0027BEA0: GetWindowLongW.USER32(00000000,000000F0), ref: 0027BF26
                                                                        • Part of subcall function 0027BEA0: MonitorFromWindow.USER32(?,00000002), ref: 0027BF3E
                                                                        • Part of subcall function 0027BEA0: GetMonitorInfoW.USER32(00000000,8000402D), ref: 0027BF54
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rect$ItemLongMessageMonitorSend$EnableFromInfoInvalidateParentShow
                                                                      • String ID:
                                                                      • API String ID: 2603943895-0
                                                                      • Opcode ID: 786fe7f6e98d3665ea4e5e2c3290ae259e68b3747872ad5b709bfeabc6b34525
                                                                      • Instruction ID: 031d8bfc708670957b30a8fa15806a5bd3b6b56140b1ea49f8d59458816e6cd1
                                                                      • Opcode Fuzzy Hash: 786fe7f6e98d3665ea4e5e2c3290ae259e68b3747872ad5b709bfeabc6b34525
                                                                      • Instruction Fuzzy Hash: 2811B67662010A5BD7219F08EC41BAA7798EB55320F008267FC19C7691D7B5EC71DBE2
                                                                      APIs
                                                                        • Part of subcall function 002698C0: LoadLibraryW.KERNEL32(ComCtl32.dll,2DDDF7D7,00000007,00000007,?), ref: 002698FA
                                                                        • Part of subcall function 002698C0: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00269920
                                                                        • Part of subcall function 002698C0: FreeLibrary.KERNEL32(00000000), ref: 002699A9
                                                                        • Part of subcall function 002698C0: GetSystemMetrics.USER32(0000000C), ref: 00269960
                                                                        • Part of subcall function 002698C0: GetSystemMetrics.USER32(0000000B), ref: 00269978
                                                                        • Part of subcall function 002698C0: LoadImageW.USER32(?,?,00000001,00000000,00000000,?), ref: 0026998B
                                                                      • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0028CA3E
                                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0028CA4D
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoadMessageMetricsSendSystem$AddressFreeImageProc
                                                                      • String ID:
                                                                      • API String ID: 852476325-0
                                                                      • Opcode ID: b875771a9a54a58a4afe3af9c59217afa08ba8594859e6d9c34bb2307846067f
                                                                      • Instruction ID: aaeeba70ff6085e76ae73fe87e0358de71d9b2c30da213f9a9270588cb054586
                                                                      • Opcode Fuzzy Hash: b875771a9a54a58a4afe3af9c59217afa08ba8594859e6d9c34bb2307846067f
                                                                      • Instruction Fuzzy Hash: 9DF0A07279131033F62012296C4BF67664DD781B61F144264FA84AF2C1ECE26C0082E8
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000003,00000000,002F38A1,000000FF,00000000,00000000,00000000,?,?,002783BC,002F38A1), ref: 00266168
                                                                      • MultiByteToWideChar.KERNEL32(00000003,00000000,002F38A1,000000FF,?,-00000001,?,002783BC,002F38A1), ref: 0026619A
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide
                                                                      • String ID:
                                                                      • API String ID: 626452242-0
                                                                      • Opcode ID: 63667cce62133a541d16e142d52717a8bed0d6945f22b59d5890497608fde954
                                                                      • Instruction ID: 1aed98975d4eafb100b82eec37a6696da5cb2ba11605e6031c83ff37192eff1a
                                                                      • Opcode Fuzzy Hash: 63667cce62133a541d16e142d52717a8bed0d6945f22b59d5890497608fde954
                                                                      • Instruction Fuzzy Hash: D501F532301222AFD6149F49EC9DF1EB75AEF85725F20411DF218EB3D1CB216D218BA4
                                                                      APIs
                                                                      • CoInitialize.OLE32(00000000), ref: 002844C5
                                                                      • CoUninitialize.OLE32(00000000,?,?,?,002E0B9D,000000FF), ref: 002844F2
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeUninitialize
                                                                      • String ID:
                                                                      • API String ID: 3442037557-0
                                                                      • Opcode ID: ea4c14ff62c8e7c3574c5b01dcf174a8d3758cef17c37ad5b2175eebdc041c9d
                                                                      • Instruction ID: e2ebb5b1e45a96c763787b97b36d30888391a927f2e5ac2f9e78a45f2f5a320c
                                                                      • Opcode Fuzzy Hash: ea4c14ff62c8e7c3574c5b01dcf174a8d3758cef17c37ad5b2175eebdc041c9d
                                                                      • Instruction Fuzzy Hash: 80F06275A59288EFD711DF68E948B59BBF8FB09714F004699E8158B6D0CB345904CB50
                                                                      APIs
                                                                      • CoInitializeEx.OLE32(00000000,00000000,2DDDF7D7,?,?,?,002D922D,000000FF), ref: 0025B005
                                                                        • Part of subcall function 00258780: SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?), ref: 00258890
                                                                        • Part of subcall function 002B3148: GetCurrentThreadId.KERNEL32 ref: 002B3173
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentFolderInitializePathThread
                                                                      • String ID:
                                                                      • API String ID: 2098070997-0
                                                                      • Opcode ID: 95deaaa54bf7e84f6fb34103723db2e415ffe0c6f8531f73c79c6554fdfc4c09
                                                                      • Instruction ID: 49f0e2bbeb85e6228af44eb5b60e7525c066fe4a7084287eac638b51f3ddd195
                                                                      • Opcode Fuzzy Hash: 95deaaa54bf7e84f6fb34103723db2e415ffe0c6f8531f73c79c6554fdfc4c09
                                                                      • Instruction Fuzzy Hash: C421AE71A20710AFD721EF64DC45F6BB7E8EB48B20F104A5AFD25977D0DB71A9108BA0
                                                                      APIs
                                                                      • VirtualProtect.KERNELBASE(00000000,?,002B1944,0030F7DC,?,?,?,?,?,?,?,?,002B1642,00000000,00000000,00000004), ref: 002B187E
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: a8b8aba925e936ac3397d84985efd32847720bdc11d25eb71675724490e99504
                                                                      • Instruction ID: d57a9846a950eb4d92f695dd814b05af7320e67b939ed45c981cfdc643d0704f
                                                                      • Opcode Fuzzy Hash: a8b8aba925e936ac3397d84985efd32847720bdc11d25eb71675724490e99504
                                                                      • Instruction Fuzzy Hash: 6611D37652020AAEEB218E40A970BEB776DFF49794F64002AF9016B141DBB0DD319A60
                                                                      APIs
                                                                      • EndDialog.USER32(?,00000002), ref: 0028432F
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Dialog
                                                                      • String ID:
                                                                      • API String ID: 1120787796-0
                                                                      • Opcode ID: 9631375a448a9d951a1a6568970df296dd31b857317c866936f6b24195fb0503
                                                                      • Instruction ID: 2507d289a9734e74bbe9703f872cd7f7c109374deea85ae050660110e959c9c5
                                                                      • Opcode Fuzzy Hash: 9631375a448a9d951a1a6568970df296dd31b857317c866936f6b24195fb0503
                                                                      • Instruction Fuzzy Hash: 4F01D174629202EFC704AF24EC48B4AFBE5FF84705F1485ADE8085BAE1C770A821DF40
                                                                      APIs
                                                                      • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,0000000C), ref: 00280472
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Open
                                                                      • String ID:
                                                                      • API String ID: 71445658-0
                                                                      • Opcode ID: bf897b612b1f7b1e8fe7d3f2d8a3783dd4130c757f0a02ecd3ec93eaf6ee7d89
                                                                      • Instruction ID: 0595b822a2616a622d5233573a0503c6b09cf7b88ee9b16f5dfa3ce163e9af7b
                                                                      • Opcode Fuzzy Hash: bf897b612b1f7b1e8fe7d3f2d8a3783dd4130c757f0a02ecd3ec93eaf6ee7d89
                                                                      • Instruction Fuzzy Hash: 79019AB2904648EFE710DF88DC01B9AFBE8FB05720F10466AE825977C0E7B56914CB90
                                                                      APIs
                                                                        • Part of subcall function 002B6215: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,00000000,00000000,80004005,2DDDF7D7,?), ref: 002B6275
                                                                      • RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateExceptionHeapRaise
                                                                      • String ID:
                                                                      • API String ID: 3789339297-0
                                                                      • Opcode ID: b6a8edaa57192d7a926f51acb70b552d53541c467e1b2e772abd6d9ae3d2e755
                                                                      • Instruction ID: e934cc4eee217784c5f3b9453b5f0e47c18e41d830d4ed7baf0177e988f94513
                                                                      • Opcode Fuzzy Hash: b6a8edaa57192d7a926f51acb70b552d53541c467e1b2e772abd6d9ae3d2e755
                                                                      • Instruction Fuzzy Hash: F3F0E271648208FFDB05CF00DC06F5ABBA8EB04B00F008A6AF814C3690D776A8148B44
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(00000000,?,00000004,?,002C97C5,?,00000000,?,002BFA29,?,00000004,00000000,00000000,?,?,002C4979), ref: 002C6E75
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 6323641ab8148d5955e7f5c48e0a8c9f58d0f93b7273499c162912670a8a2a02
                                                                      • Instruction ID: d3461468609535123ce99b138670b6039429b132639dd6cc1bf3e5eca1895506
                                                                      • Opcode Fuzzy Hash: 6323641ab8148d5955e7f5c48e0a8c9f58d0f93b7273499c162912670a8a2a02
                                                                      • Instruction Fuzzy Hash: 8CF0E53693462366DB203A79DC09F9B36889F497A0F11432AEC04D6180DF61CC6186F0
                                                                      APIs
                                                                      • VirtualProtect.KERNELBASE(00317000,00000080,00000002,?), ref: 002C7636
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: 0460f4df330554c394d8749da5b3cef7c59005c91380aac9be8c362434f1a31a
                                                                      • Instruction ID: 619aa62cf89aa23830971923aae1df50f9f6974f308d6574deb253107a901d32
                                                                      • Opcode Fuzzy Hash: 0460f4df330554c394d8749da5b3cef7c59005c91380aac9be8c362434f1a31a
                                                                      • Instruction Fuzzy Hash: 20C08C31388308B7E7118792AC0BF8B36ACE784FA0F148114F605EA0C0D9E0EE044220
                                                                      APIs
                                                                      • SHGetFolderPathW.SHELL32(?,?,?,?,?,SystemFolder,0000000C), ref: 00272756
                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0027285F
                                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsFolder,0000000D), ref: 0027298C
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsVolume,0000000D), ref: 00272ABC
                                                                        • Part of subcall function 00245350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0025E648,-00000010), ref: 00245373
                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,WindowsVolume,0000000D), ref: 00272C2C
                                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,0000000D,WindowsVolume,0000000D), ref: 00272D12
                                                                      • LoadLibraryW.KERNEL32(shfolder.dll), ref: 00272DA0
                                                                      • GetProcAddress.KERNEL32(?,SHGetFolderPathW), ref: 00272DDC
                                                                      • GetEnvironmentVariableW.KERNEL32(APPDATA,?,00000104), ref: 00272FD0
                                                                      • SHGetPathFromIDListW.SHELL32(?,?), ref: 00273059
                                                                      • SHGetMalloc.SHELL32(00000000), ref: 00273072
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Directory$FolderPathWindows$AddressEnvironmentFileFindFromHeapLibraryListLoadLocationMallocModuleNameProcProcessResourceSpecialSystemVariable
                                                                      • String ID: 001$APPDATA$AppDataFolder$PROGRAMFILES$ProgramFiles$ProgramFiles64Folder$ProgramFilesFolder$ProgramW6432$SETUPEXEDIR$SHGetFolderPathW$Shell32.dll$Shlwapi.dll$System32Folder$SystemFolder$TempFolder$WindowsFolder$WindowsVolume$shfolder.dll
                                                                      • API String ID: 700146523-3411744261
                                                                      • Opcode ID: 388137aff68e5399d199521e48cb5a1f67deca676ff9afbb5348c1855d17420c
                                                                      • Instruction ID: a2b00999edd6d2d2c3ff11bd7a931499586185080ea0b53a3b3c1730cbbe5deb
                                                                      • Opcode Fuzzy Hash: 388137aff68e5399d199521e48cb5a1f67deca676ff9afbb5348c1855d17420c
                                                                      • Instruction Fuzzy Hash: 8F623831620216CBDB24DF24CC54BBAB3B6FF64354F5481ACD90A97391EB329E69CB50
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(00310A8C,C0000000,00000003,00000000,00000004,00000080,00000000,2DDDF7D7,00000000,00310A80,00310A68), ref: 0026AB18
                                                                      • GetLastError.KERNEL32 ref: 0026AB40
                                                                      • OutputDebugStringW.KERNEL32(00000000,00000020), ref: 0026ABC5
                                                                      • OutputDebugStringW.KERNEL32(00000000,?,0000001C), ref: 0026ACF2
                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0000001C), ref: 0026AD8E
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • OutputDebugStringW.KERNEL32(00000000,?,0000001D), ref: 0026AE31
                                                                      • WriteFile.KERNEL32(00000000,002DC02D,00000002,00000002,00000000,?,0000001D), ref: 0026AEDA
                                                                      • FlushFileBuffers.KERNEL32(00000000,?,0000001D), ref: 0026AEE3
                                                                      • WriteFile.KERNEL32(00000000,00310864,00000000,00000002,00000000,?,0000001D), ref: 0026AF05
                                                                      • WriteFile.KERNEL32(00000000,000000FF,?,00000002,00000000,002F37E8,00000002), ref: 0026AFC4
                                                                      • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001D), ref: 0026AFCD
                                                                      • FlushFileBuffers.KERNEL32(00000000,?,0000001D), ref: 0026AF0E
                                                                        • Part of subcall function 00245350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0025E648,-00000010), ref: 00245373
                                                                      • WriteFile.KERNEL32(00000000,000000FF,?,00000002,00000000,002F37E8,00000002), ref: 0026B079
                                                                      • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001D), ref: 0026B082
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$BuffersFlushWrite$DebugOutputString$CreateErrorFindHeapLastPointerProcessResource
                                                                      • String ID: LOGGER->Creating LOG file at:$LOGGER->Reusing LOG file at:$LOGGER->failed to create LOG at:$OS Version: %u.%u.%u SP%u (%s) [%s]$server$workstation$x64$x86$7/
                                                                      • API String ID: 611875259-2793722445
                                                                      • Opcode ID: ffadc3463089c49c698b135a69dd3f442bfe569e2bc0b7a0e9d3690bce285e8e
                                                                      • Instruction ID: df842fd0cba8745a3b7fff7dbff2813439dff585fe849a9acfba1ba3726d1a72
                                                                      • Opcode Fuzzy Hash: ffadc3463089c49c698b135a69dd3f442bfe569e2bc0b7a0e9d3690bce285e8e
                                                                      • Instruction Fuzzy Hash: F012EE70A106059BDB05DF68CC88B6EBBB5FF44320F144268E925AB3D1DB74AE51CF91
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 002AF45E
                                                                      • GetLastError.KERNEL32 ref: 002AF469
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 002AF953
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 002AF997
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 002AFAFE
                                                                      • SetEvent.KERNEL32(?), ref: 002AFE21
                                                                      • GetLastError.KERNEL32 ref: 002AFE2F
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 002B01B9
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 002B020F
                                                                      • WaitForSingleObject.KERNEL32(00000001,000000FF), ref: 002B0250
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 002B025B
                                                                      • EnterCriticalSection.KERNEL32(?), ref: 002B0381
                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 002B0418
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 002B04BF
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 002B050F
                                                                      • SetEvent.KERNEL32(?), ref: 002B05AB
                                                                      • GetLastError.KERNEL32 ref: 002B05B9
                                                                      • SetEvent.KERNEL32(?), ref: 002B05CE
                                                                      • GetLastError.KERNEL32 ref: 002B05D8
                                                                      • SetEvent.KERNEL32(?), ref: 002B0608
                                                                      • GetLastError.KERNEL32 ref: 002B0616
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$ErrorLast$EnterEventLeave$ObjectSingleWait
                                                                      • String ID:
                                                                      • API String ID: 3699643388-0
                                                                      • Opcode ID: 0d807ff8b354ad0ddf1c089ef064877851c2541f2639a447988ab38174798d5f
                                                                      • Instruction ID: 2eb584a437768d5841e0881ca0801932e0fb471e9704cd2fa5d234ed7d7f8ae5
                                                                      • Opcode Fuzzy Hash: 0d807ff8b354ad0ddf1c089ef064877851c2541f2639a447988ab38174798d5f
                                                                      • Instruction Fuzzy Hash: D6C2E070A183828FD764CF69C580B9BFBE1BF89344F14492EE99987351EB74A854CF42
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000,00000000,?), ref: 0029949D
                                                                      • CloseHandle.KERNEL32(00000000), ref: 002994AF
                                                                      • GetLastError.KERNEL32 ref: 002994B9
                                                                      • CloseHandle.KERNEL32(FFFFFFFF), ref: 002994F9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$CreateErrorFileLast
                                                                      • String ID: $$?$NUMBER_OF_PROCESSORS$\$\
                                                                      • API String ID: 3884794734-3915631646
                                                                      • Opcode ID: 8bc803ea8f15a8462153df59cf02938efede92ca939f4a89b0ab512b8cff440a
                                                                      • Instruction ID: 240c1dc156244329fa543063d7d368aceced23c63dfd996792c291003eb944d5
                                                                      • Opcode Fuzzy Hash: 8bc803ea8f15a8462153df59cf02938efede92ca939f4a89b0ab512b8cff440a
                                                                      • Instruction Fuzzy Hash: 7D724570810669DBDB24DF28CC44BADBBF4BF48314F1481E9E489A7291DB75AE94CF90
                                                                      APIs
                                                                      • FindClose.KERNEL32(00000000,00000000), ref: 00263BC5
                                                                      • PathIsUNCW.SHLWAPI(2DDDF7D7,*.*,00000000), ref: 00263C8B
                                                                      • FindFirstFileW.KERNEL32(2DDDF7D7,?,*.*,00000000), ref: 00263E1B
                                                                      • GetFullPathNameW.KERNEL32(2DDDF7D7,00000000,00000000,00000000), ref: 00263E35
                                                                      • GetFullPathNameW.KERNEL32(2DDDF7D7,00000000,?,00000000), ref: 00263E68
                                                                      • FindClose.KERNEL32(00000000,?,00000000), ref: 00263ED0
                                                                      • SetLastError.KERNEL32(0000007B,?,00000000), ref: 00263EDA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: FindPath$CloseFullName$ErrorFileFirstLast
                                                                      • String ID: 2Svp1Sv$*.*$\\?\$\\?\UNC\
                                                                      • API String ID: 539638818-2136517478
                                                                      • Opcode ID: 32b94afc3951d622e64a9aadd7ade49d9296551e66e0ea7f30358fb7d92fbd44
                                                                      • Instruction ID: 294c567550b4173dafe8714f2ac304adad4d941fe7b4cdd8c8f9476cbd3b3dba
                                                                      • Opcode Fuzzy Hash: 32b94afc3951d622e64a9aadd7ade49d9296551e66e0ea7f30358fb7d92fbd44
                                                                      • Instruction Fuzzy Hash: 42E1F370A106129BDB08DF68CC89BAEB7B1FF44314F14416DE9169B3D1DB76AEA0CB40
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,00000000,-00000010,?,2DDDF7D7,?,?,00000000), ref: 0028AD09
                                                                      • FindNextFileW.KERNEL32(?,00000000,?,00000000), ref: 0028AD24
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$FirstNext
                                                                      • String ID: 2Svp1Sv$0!$$@9/$p2Sv3Sv
                                                                      • API String ID: 1690352074-2548255900
                                                                      • Opcode ID: 8014dc3e209f79b0ffa4d8fe971407387b62cb11135ffc934b6db6d2270817e4
                                                                      • Instruction ID: 269c8e9f5d4b005f5514fa58ca27b6885afff49463df8bd8b72f40b08cd613be
                                                                      • Opcode Fuzzy Hash: 8014dc3e209f79b0ffa4d8fe971407387b62cb11135ffc934b6db6d2270817e4
                                                                      • Instruction Fuzzy Hash: A681AB75D01689DFDB01DFA8DC98AEDBBB4FF09320F148169E815AB291DB309A15CF50
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(?,?,?,?,00000000), ref: 00297CCD
                                                                      • GetProcessAffinityMask.KERNEL32(00000000), ref: 00297CD4
                                                                      • GetSystemInfo.KERNEL32(?), ref: 00297D55
                                                                      • GetModuleHandleA.KERNEL32 ref: 00297DA4
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00297DAB
                                                                      • GlobalMemoryStatus.KERNEL32(?), ref: 00297E05
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Process$AddressAffinityCurrentGlobalHandleInfoMaskMemoryModuleProcStatusSystem
                                                                      • String ID: $@$GlobalMemoryStatusEx$kernel32.dll
                                                                      • API String ID: 3120231856-802862622
                                                                      • Opcode ID: 1b873502bde0cc12b4672f6e342ef6ecf39c85f5c33e728cb1c80a2d7a193723
                                                                      • Instruction ID: dd20a3a56b488cba97858a6e4d3a93c12ce47504b4a84091992b6a3a72ea031c
                                                                      • Opcode Fuzzy Hash: 1b873502bde0cc12b4672f6e342ef6ecf39c85f5c33e728cb1c80a2d7a193723
                                                                      • Instruction Fuzzy Hash: 4B718CB2A183118FD708CF19D89475ABBE5BFC8314F05896DE899CB350D7B4D904CB86
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000060,2DDDF7D7,8007000E,00000000,?,?,?,?,?,?,?,?,002DA915,000000FF), ref: 00262799
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,?,?,?,?,?,?,?,?,002DA915,000000FF), ref: 002627AC
                                                                      • FindResourceW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,002DA915,000000FF), ref: 002627CC
                                                                      • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,002DA915,000000FF), ref: 002627E4
                                                                        • Part of subcall function 00260A20: GetLastError.KERNEL32(2DDDF7D7,00000000,002D5110,000000FF,?,8007000E), ref: 00260A42
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,002DA915,000000FF), ref: 002628C5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$Resource$ErrorFindFreeLast
                                                                      • String ID: Module$Module_Raw$REGISTRY
                                                                      • API String ID: 328770362-549000027
                                                                      • Opcode ID: 09062f0262b0346dec574fa0bc35da87c531754c61ec9538b20cc4f1407e9ccc
                                                                      • Instruction ID: c09c005799b3d0a2b7a961286f5f9f8c5eef380018268ab56e29f7e410d2b9d7
                                                                      • Opcode Fuzzy Hash: 09062f0262b0346dec574fa0bc35da87c531754c61ec9538b20cc4f1407e9ccc
                                                                      • Instruction Fuzzy Hash: 6551D371920649EFDB21DF54CC84BEE77B9FF44310F204129E905AB280DB708A988B75
                                                                      APIs
                                                                      • ResetEvent.KERNEL32(?), ref: 002ADA77
                                                                      • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 002ADA87
                                                                      • GetLastError.KERNEL32 ref: 002ADA98
                                                                      • ResetEvent.KERNEL32(?), ref: 002ADAB8
                                                                      • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 002ADAC8
                                                                      • GetLastError.KERNEL32 ref: 002ADAD9
                                                                      • GetLastError.KERNEL32 ref: 002ADB1A
                                                                      • SetEvent.KERNEL32(?), ref: 002ADB56
                                                                      • GetLastError.KERNEL32 ref: 002ADB60
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?), ref: 002ADBA8
                                                                      • GetLastError.KERNEL32 ref: 002ADBB3
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorEventLast$CreateReset$ObjectSingleWait
                                                                      • String ID:
                                                                      • API String ID: 3708806560-0
                                                                      • Opcode ID: 68251e8fb3df5a8d9dcae640b7920f665c2659ce37cce386e41cfbab648c955f
                                                                      • Instruction ID: 06cc94c176e50e4ee49fcffff3fd2013583d3ef7a2e61c42e3325d1858013864
                                                                      • Opcode Fuzzy Hash: 68251e8fb3df5a8d9dcae640b7920f665c2659ce37cce386e41cfbab648c955f
                                                                      • Instruction Fuzzy Hash: A391E6313647028FE7248F29D894B2673D6FB86325F15492EE557CBAA1DF71E860CB20
                                                                      APIs
                                                                        • Part of subcall function 002B46AF: AcquireSRWLockExclusive.KERNEL32(0030FFB8,?,?,?,00243A56,00310848,2DDDF7D7,?,?,002D516D,000000FF,?,002810B6,2DDDF7D7,?), ref: 002B46BA
                                                                        • Part of subcall function 002B46AF: ReleaseSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243A56,00310848,2DDDF7D7,?,?,002D516D,000000FF,?,002810B6,2DDDF7D7,?), ref: 002B46F4
                                                                      • GetStdHandle.KERNEL32(000000F5,?,?,?), ref: 0026E2EA
                                                                      • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?), ref: 0026E2F1
                                                                      • GetStdHandle.KERNEL32(000000F5,0000000C,?,?), ref: 0026E305
                                                                      • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 0026E30C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleExclusiveHandleLock$AcquireAttributeBufferInfoReleaseScreenText
                                                                      • String ID: Error$F^&
                                                                      • API String ID: 719367182-810301205
                                                                      • Opcode ID: 2f9979a925e09aae5e4da4f3a77c96c030ba0b0facd245799ac11cc7edd29157
                                                                      • Instruction ID: a0e36e80eb161521fa0da7f78034b9d94fd2d9e411ebd2f4195ab421b2105e16
                                                                      • Opcode Fuzzy Hash: 2f9979a925e09aae5e4da4f3a77c96c030ba0b0facd245799ac11cc7edd29157
                                                                      • Instruction Fuzzy Hash: 7A427B70D1025ADFDB24DF64CC44BEEBBB4BF48314F1042A9E519A7291EB74AA94CF90
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • GetLogicalDriveStringsW.KERNEL32(00000064,?), ref: 00288320
                                                                      • GetDriveTypeW.KERNEL32(?), ref: 0028833A
                                                                      • Wow64DisableWow64FsRedirection.KERNEL32(00000000,00000000), ref: 002883E3
                                                                      • Wow64RevertWow64FsRedirection.KERNEL32(00000000,00000000), ref: 00288686
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Wow64$DriveRedirection$DisableHeapLogicalProcessRevertStringsType
                                                                      • String ID: 2Svp1Sv$0!$$]%!$p2Sv3Sv$\/
                                                                      • API String ID: 4157823300-3308461500
                                                                      • Opcode ID: c696f40ebed0c95f71e786da6a1ffa00c7b85f342c3c8f593605c33888cdf908
                                                                      • Instruction ID: 61d288f296d9f5093e29d5bb5d0c144e96c57c313ff6596d1aa190fe7692d01b
                                                                      • Opcode Fuzzy Hash: c696f40ebed0c95f71e786da6a1ffa00c7b85f342c3c8f593605c33888cdf908
                                                                      • Instruction Fuzzy Hash: 7302033591166ACFDB24EF28CC84BADB7B5AF04310F5485E9D91AA72C1DB709E90CF90
                                                                      APIs
                                                                      • GetForegroundWindow.USER32(2DDDF7D7,?,?), ref: 0024C402
                                                                      • MessageBoxW.USER32(00000000,?,?,00000044), ref: 0024C40D
                                                                      • GetCurrentProcess.KERNEL32 ref: 0024C4FB
                                                                      • OpenProcessToken.ADVAPI32(00000000,00000028,00000000), ref: 0024C508
                                                                      • CloseHandle.KERNEL32(00000000), ref: 0024C528
                                                                      • GetLastError.KERNEL32 ref: 0024C56D
                                                                      • ExitWindowsEx.USER32(00000006,80040002), ref: 0024C57E
                                                                      • CloseHandle.KERNEL32(00000000), ref: 0024C59E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandleProcess$CurrentErrorExitForegroundLastMessageOpenTokenWindowWindows
                                                                      • String ID: SeShutdownPrivilege
                                                                      • API String ID: 1440564136-3733053543
                                                                      • Opcode ID: 440df4030d0a141ca7f78470c6a2b2b3137481fa36c9e25e84a8bfce86f8a630
                                                                      • Instruction ID: d0ee83390064acb1a8f89ec3f96b4e4ad66ccfd74a1f2066141aa3f6cdc09030
                                                                      • Opcode Fuzzy Hash: 440df4030d0a141ca7f78470c6a2b2b3137481fa36c9e25e84a8bfce86f8a630
                                                                      • Instruction Fuzzy Hash: 5B618070A516499BDB04DFA9DC88BADBBB8EF09320F244159E811BB3D0CB75AD05CF60
                                                                      APIs
                                                                      • GetStdHandle.KERNEL32(000000F5,?,?,?), ref: 0026E2EA
                                                                      • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?), ref: 0026E2F1
                                                                      • GetStdHandle.KERNEL32(000000F5,0000000C,?,?), ref: 0026E305
                                                                      • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 0026E30C
                                                                      • GetStdHandle.KERNEL32(000000F5,?,?,00000000,?,00000000,002F37E8,00000002,?,?), ref: 0026E3CA
                                                                      • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 0026E3D1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleHandle$AttributeText$BufferInfoScreen
                                                                      • String ID: *** Stack Trace (x86) ***$F^&
                                                                      • API String ID: 575076100-3799682818
                                                                      • Opcode ID: 1f0befab80280998540c97373a73c320b1333995e11da660db6f8ea43aa0a759
                                                                      • Instruction ID: a81752241341ffcab121a2cd622c55e70bac56413537d768bb8a257367c793a1
                                                                      • Opcode Fuzzy Hash: 1f0befab80280998540c97373a73c320b1333995e11da660db6f8ea43aa0a759
                                                                      • Instruction Fuzzy Hash: 6B228D70D1025ADFDB24DF68C845BEEBBB8FF48314F1042A9E515A7291EB706A94CF90
                                                                      APIs
                                                                      • SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,2DDDF7D7,00000000,00000000,?), ref: 0026F2CB
                                                                      • GetTempFileNameW.KERNEL32(?,shim_clone,00000000,?,?,00000000,00000000), ref: 0026F444
                                                                      • Wow64DisableWow64FsRedirection.KERNEL32(00000000,?,?,00000000,00000000), ref: 0026F4F1
                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000000,00000000), ref: 0026F513
                                                                      • Wow64RevertWow64FsRedirection.KERNEL32(00000000,?,?,00000000), ref: 0026F59E
                                                                      • DeleteFileW.KERNEL32(?,2DDDF7D7,?,00000000,002D4F60,000000FF,?,80004005,?), ref: 0026F6AD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Wow64$File$Redirection$CopyDeleteDisableFolderNamePathRevertTemp
                                                                      • String ID: shim_clone
                                                                      • API String ID: 3507832535-3944563459
                                                                      • Opcode ID: 2e7e19075f61df3a6c410ce8ce5d11c173ef231cc58f66f0068e1be5d39d0b8d
                                                                      • Instruction ID: 5b94729c6b3a596ee5315b1ed4c865a56c9d6580eb3a39dcf51a3eadf4ba775b
                                                                      • Opcode Fuzzy Hash: 2e7e19075f61df3a6c410ce8ce5d11c173ef231cc58f66f0068e1be5d39d0b8d
                                                                      • Instruction Fuzzy Hash: C8C10370A106968FCF28EF28DD857AA77B8EF05300F1440F9E506DB292EB349E95CB54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindFirstHeapProcess
                                                                      • String ID: 2Svp1Sv$0!$$p2Sv3Sv
                                                                      • API String ID: 284326027-1571709011
                                                                      • Opcode ID: bc666efb8c7ef30163bb9b3db38754e23621729efd32997da7d74258f1f0a15f
                                                                      • Instruction ID: d0a596343f49ba3e7ebe6df0283b322f85ebfa514447c41ca8cc52866f2f1023
                                                                      • Opcode Fuzzy Hash: bc666efb8c7ef30163bb9b3db38754e23621729efd32997da7d74258f1f0a15f
                                                                      • Instruction Fuzzy Hash: A591BF759122599BDB10DF28CC8C7ACBBB4AF05320F1882D9E419A72D2DB309E94CF91
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?,?,2DDDF7D7,?), ref: 00241A49
                                                                      • FindClose.KERNEL32(000000FF,?), ref: 00241C12
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID: 2Svp1Sv$0!$$p2Sv3Sv
                                                                      • API String ID: 2295610775-1571709011
                                                                      • Opcode ID: 4fc49d3a7c25d9b8f1d8d36f1589246f6127def46bedbc0c9104841241519a2c
                                                                      • Instruction ID: de4659ba1afc6f4e8be7b0d2ae49b530598ad13e5941c0fe95f9dc220f524fb5
                                                                      • Opcode Fuzzy Hash: 4fc49d3a7c25d9b8f1d8d36f1589246f6127def46bedbc0c9104841241519a2c
                                                                      • Instruction Fuzzy Hash: 9E91CD70D11259DFDB28DF64C899BEEBBB4EF44300F508299D419A7291EB706EA4CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 373c2003a9924758b754d1433529d2ba4aec40247231dd733dbe93b3ceb04ac5
                                                                      • Instruction ID: 41b45b13798388c97131f7db9f706814e78690b804e822c1d30809acb33a3a0e
                                                                      • Opcode Fuzzy Hash: 373c2003a9924758b754d1433529d2ba4aec40247231dd733dbe93b3ceb04ac5
                                                                      • Instruction Fuzzy Hash: 39E27870A10259DFDF10DF68C884BADBBB5BF4A304F1481A9E805AB391CB74AE55CF91
                                                                      APIs
                                                                      • IsProcessorFeaturePresent.KERNEL32(0000000C,002B1DDA,00000000,?,002B1F72,00000000), ref: 002B1EC0
                                                                      • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00000000,?,002B1F72,00000000), ref: 002B1EE7
                                                                      • HeapAlloc.KERNEL32(00000000,?,002B1F72,00000000), ref: 002B1EEE
                                                                      • InitializeSListHead.KERNEL32(00000000,?,002B1F72,00000000), ref: 002B1EFB
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000,?,002B1F72,00000000), ref: 002B1F10
                                                                      • HeapFree.KERNEL32(00000000,?,002B1F72,00000000), ref: 002B1F17
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFeatureFreeHeadInitializeListPresentProcessor
                                                                      • String ID:
                                                                      • API String ID: 1475849761-0
                                                                      • Opcode ID: cd80acdcc0440669a3c75669f95756adb4c67e8e7dfa3f7d269abafa5d325bfd
                                                                      • Instruction ID: 06a61727bef3cfd0105af3e14e0997784a213a525448c754a844f3bd6d9b51af
                                                                      • Opcode Fuzzy Hash: cd80acdcc0440669a3c75669f95756adb4c67e8e7dfa3f7d269abafa5d325bfd
                                                                      • Instruction Fuzzy Hash: 39F0AF312942429FEB219F39FC5CB6676ACBB95752F008029F985C7250EB308821CB90
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?,00000000,00000010), ref: 00289916
                                                                      • FindClose.KERNEL32(00000000), ref: 00289A99
                                                                        • Part of subcall function 00243620: RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Find$AllocateCloseFileFirstHeap
                                                                      • String ID: 2Svp1Sv$%d.%d.%d.%d$0!$
                                                                      • API String ID: 1673784098-2977300667
                                                                      • Opcode ID: 59fa8fdeb75162bbe4281d8da053442abcb270323a8c5256514713cc72225cba
                                                                      • Instruction ID: 55738cdad2a76fee8756797ffa3f2aade2514df91295521962f41d2adc3cfafb
                                                                      • Opcode Fuzzy Hash: 59fa8fdeb75162bbe4281d8da053442abcb270323a8c5256514713cc72225cba
                                                                      • Instruction Fuzzy Hash: 58719A35905259DFCF24EF28CC48BADBBB4AF04314F1482D9E819AB291DB319E94CF80
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(?,2000000B,002CFD5D,00000002,00000000,?,?,?,002CFD5D,?,00000000), ref: 002CFADE
                                                                      • GetLocaleInfoW.KERNEL32(?,20001004,002CFD5D,00000002,00000000,?,?,?,002CFD5D,?,00000000), ref: 002CFB07
                                                                      • GetACP.KERNEL32(?,?,002CFD5D,?,00000000), ref: 002CFB1C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID: ACP$OCP
                                                                      • API String ID: 2299586839-711371036
                                                                      • Opcode ID: 18d61af0edeb1fd7689ff39d808cbfd123ac4e6cce5f93f24ccd856903118709
                                                                      • Instruction ID: 2d3c2c0b85865d5beb5e92d5f4c3c7f4664ebe026dbeecf4345034f3d13d1192
                                                                      • Opcode Fuzzy Hash: 18d61af0edeb1fd7689ff39d808cbfd123ac4e6cce5f93f24ccd856903118709
                                                                      • Instruction Fuzzy Hash: 0421C722660102ABDBB48F55DB00F97B2A7EB48B54B56823CED0ECB214E732DD50C350
                                                                      APIs
                                                                      • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 002CFD2F
                                                                      • IsValidCodePage.KERNEL32(00000000), ref: 002CFD6D
                                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 002CFD80
                                                                      • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 002CFDC8
                                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 002CFDE3
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$InfoValid$CodeDefaultPageUser
                                                                      • String ID:
                                                                      • API String ID: 3475089800-0
                                                                      • Opcode ID: 38498af6ceec3738a623510a5a6e2c20ec8ca7ddc749c8df22c84d134902c510
                                                                      • Instruction ID: 7e2b1cdf23ddbbac5b5e61f2f07ed1e3117c304c6cd7b309d55652fff180d4ba
                                                                      • Opcode Fuzzy Hash: 38498af6ceec3738a623510a5a6e2c20ec8ca7ddc749c8df22c84d134902c510
                                                                      • Instruction Fuzzy Hash: 49518171A2020AAFDB50DFA4DD85FBE77B9AF08700F14067DE915EB151E7709A20CBA0
                                                                      APIs
                                                                      • GetACP.KERNEL32(?,?,?,?,?,?,002C5626,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 002CF34D
                                                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,002C5626,?,?,?,00000055,?,-00000050,?,?), ref: 002CF384
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00001002,?,00000078,-00000050,00000000,000000D0), ref: 002CF4F0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CodeInfoLocalePageValid
                                                                      • String ID: utf8
                                                                      • API String ID: 790303815-905460609
                                                                      • Opcode ID: c4c3f8a441e65d8060b46f50b8b6cd836c317928a89293783b3f36803633595c
                                                                      • Instruction ID: f04e4ee2da63f892081d9c8bacfdc6ff40ccbe2447444c32719fb8c36c9b38e7
                                                                      • Opcode Fuzzy Hash: c4c3f8a441e65d8060b46f50b8b6cd836c317928a89293783b3f36803633595c
                                                                      • Instruction Fuzzy Hash: F0710B71620242AADB68AF348D46FBB73A9EF54740F15027EFA05DB181F770DD60C691
                                                                      APIs
                                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0028A97A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: DiskFreeSpace
                                                                      • String ID: \$\$\
                                                                      • API String ID: 1705453755-3791832595
                                                                      • Opcode ID: 00421ab3b5f798c06c1f8d008cd04a23f797593a29c7099a7c2220e1e17206bb
                                                                      • Instruction ID: 1731cd2330e29420425647ab16cb644d01ab0cafcdeb9cf8504fa22606a55b50
                                                                      • Opcode Fuzzy Hash: 00421ab3b5f798c06c1f8d008cd04a23f797593a29c7099a7c2220e1e17206bb
                                                                      • Instruction Fuzzy Hash: B841C626929256C6DB30BF2484416ABB3F4FF95354F168A2FE8D897080FB6099958387
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?,?), ref: 00280E9F
                                                                      • FindClose.KERNEL32(00000000), ref: 00280EEC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID: 2Svp1Sv$0!$
                                                                      • API String ID: 2295610775-655561941
                                                                      • Opcode ID: 6a3a6b9d15f9f571b0c726cfe3f98cd06d569ff990ef8fdf726c64af142000cb
                                                                      • Instruction ID: 9afd6ba4a4c85fd2d563f5e0c1b16de5030f6ca3ef798c4e13eb077d08f31bae
                                                                      • Opcode Fuzzy Hash: 6a3a6b9d15f9f571b0c726cfe3f98cd06d569ff990ef8fdf726c64af142000cb
                                                                      • Instruction Fuzzy Hash: B241E435A06259CFCB10EF28C8887ADB7B4EF05320F144299E819A73D1CB359E59CF90
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(00000000,?,2DDDF7D7,?,00000000), ref: 00267E56
                                                                      • FindClose.KERNEL32(00000000), ref: 00267EBE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID: 2Svp1Sv$0!$
                                                                      • API String ID: 2295610775-655561941
                                                                      • Opcode ID: a7c2e997420c0bc291c382f5331bcaa67f053b565eb7676d7fa0f6ca6f0b3fa6
                                                                      • Instruction ID: c7cef19279a9536bf068e963cd4c02809eecdc811c0deee6555cecf22345cb26
                                                                      • Opcode Fuzzy Hash: a7c2e997420c0bc291c382f5331bcaa67f053b565eb7676d7fa0f6ca6f0b3fa6
                                                                      • Instruction Fuzzy Hash: EE21C131908658DBDB10DF68DC887A9B7B8EB45320F1443AAE429A72D1DB755E44CF40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                      • API String ID: 0-2761157908
                                                                      • Opcode ID: c1ff4e0d10b3e582480ae919057b53e37805a45711f164e66707b850a0a4e0aa
                                                                      • Instruction ID: 7d65fea9f3881a1c0d97bdb1a8e6e8865945c51868f1a20ab5850e1869554e27
                                                                      • Opcode Fuzzy Hash: c1ff4e0d10b3e582480ae919057b53e37805a45711f164e66707b850a0a4e0aa
                                                                      • Instruction Fuzzy Hash: DFC26D72E282299FDB65CE28DC807EAB3B5EB54304F1441EBD84DE7640D774AEA58F40
                                                                      APIs
                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 002B534E
                                                                      • IsDebuggerPresent.KERNEL32 ref: 002B541A
                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 002B5433
                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 002B543D
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                      • String ID:
                                                                      • API String ID: 254469556-0
                                                                      • Opcode ID: 7fedc15b4d109fa6f66e4e7175cc40791b5f995f41c996be51132fcb8444af5e
                                                                      • Instruction ID: b977d7a8df281dbe6104ae45e1b5d59dfaf1c953b5c76cb26ffdc71ea545e5fd
                                                                      • Opcode Fuzzy Hash: 7fedc15b4d109fa6f66e4e7175cc40791b5f995f41c996be51132fcb8444af5e
                                                                      • Instruction Fuzzy Hash: C5312A75C152299BDF20DF64E9897CDBBB8AF08340F1041EAE40CAB250E7709B85CF44
                                                                      APIs
                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,002B4553,002EA864), ref: 002B4438
                                                                      • UnhandledExceptionFilter.KERNEL32(002B4553,?,002B4553,002EA864), ref: 002B4441
                                                                      • GetCurrentProcess.KERNEL32(C0000409,?,002B4553,002EA864), ref: 002B444C
                                                                      • TerminateProcess.KERNEL32(00000000,?,002B4553,002EA864), ref: 002B4453
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                                                      • String ID:
                                                                      • API String ID: 3231755760-0
                                                                      • Opcode ID: 2eb5cf480e07f34ba17d77c9223c906b2542d909f2fa9c928154aae804f1364a
                                                                      • Instruction ID: 02a41919d6e62e5802656b102c8af1d02ed114d3523b911a9adb0cb4d6795a74
                                                                      • Opcode Fuzzy Hash: 2eb5cf480e07f34ba17d77c9223c906b2542d909f2fa9c928154aae804f1364a
                                                                      • Instruction Fuzzy Hash: 26D01231088284ABCA002FE1FC4CA883F28EB05216F004440F30E8D060CB3144419B61
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,002F37C0,00000000), ref: 00294E41
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,?,-00000001,00000078,-00000001), ref: 00294E7D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale$HeapProcess
                                                                      • String ID: %d-%s
                                                                      • API String ID: 3246605784-1781338863
                                                                      • Opcode ID: a77ff80dd80d80f85dd5c292b18ffeffb982ae0f5edac4f2716427df17ed2930
                                                                      • Instruction ID: 2ce10d768c2bf1724117f10ada5e6069d02608d66444f79bebc9322406286248
                                                                      • Opcode Fuzzy Hash: a77ff80dd80d80f85dd5c292b18ffeffb982ae0f5edac4f2716427df17ed2930
                                                                      • Instruction Fuzzy Hash: BB31CE71A10209ABDB05EF98CC49BAEFBB8FF44724F104159E615AB3D1DBB15A10CF90
                                                                      APIs
                                                                      • VirtualQuery.KERNEL32(80000000,00000000,0000001C,?,?,?,?,?,?,?,002B1642,00000000,00000000,00000004,0030F7DC,002B1944), ref: 002B170E
                                                                      • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,002B1642,00000000,00000000,00000004,0030F7DC,002B1944), ref: 002B1729
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InfoQuerySystemVirtual
                                                                      • String ID: D
                                                                      • API String ID: 401686933-2746444292
                                                                      • Opcode ID: 0201b2e1ae6c4f929fecb3a4d1515db09caed23060cb0379580372600aa7fba2
                                                                      • Instruction ID: f97f5a27b05d5cea2c9b0782d2a03eb8a1036ded35b07e383d7160821c659059
                                                                      • Opcode Fuzzy Hash: 0201b2e1ae6c4f929fecb3a4d1515db09caed23060cb0379580372600aa7fba2
                                                                      • Instruction Fuzzy Hash: B801D432650209ABCB14DE29DC49ADEBBA9EFC4364F08C121ED19DB144DB34D9218A80
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00001002,?,00000078), ref: 002CF717
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00001001,?,00000078), ref: 002CF75B
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00001001,?,00000078), ref: 002CF825
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID:
                                                                      • API String ID: 2299586839-0
                                                                      • Opcode ID: a58dca6ea281d4af60884e6cc202b499bdcc74bfa50b1cb0dd012677436e0f07
                                                                      • Instruction ID: b5f170fdaf6f874e3408598f3f4958530cdd115df6ad7b8f143172a40c75f3f0
                                                                      • Opcode Fuzzy Hash: a58dca6ea281d4af60884e6cc202b499bdcc74bfa50b1cb0dd012677436e0f07
                                                                      • Instruction Fuzzy Hash: 3861A5719202179FEB689F24CE81FBAB7AAEF04300F20427EE905C6145EB75DDA5DB50
                                                                      APIs
                                                                      • GetVersionExW.KERNEL32(?), ref: 002AE3A2
                                                                      • GetVersionExW.KERNEL32(00000114), ref: 002AE3F1
                                                                      • IsProcessorFeaturePresent.KERNEL32(00000011), ref: 002AE409
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Version$FeaturePresentProcessor
                                                                      • String ID:
                                                                      • API String ID: 1871528217-0
                                                                      • Opcode ID: d4150698525ddb843a48a5361432deb8f322363c31842c0aaae524db12292457
                                                                      • Instruction ID: b4da3121196516cd5a4151862b45bb8476d44fcb53702e6897c43419d52c6e99
                                                                      • Opcode Fuzzy Hash: d4150698525ddb843a48a5361432deb8f322363c31842c0aaae524db12292457
                                                                      • Instruction Fuzzy Hash: 14613B71B102204BE748CE2DDCD52EABBDAEBCD341F054A3EE496C6290DA78C555CBA0
                                                                      APIs
                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 002B979B
                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 002B97A5
                                                                      • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,00000000), ref: 002B97B2
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                      • String ID:
                                                                      • API String ID: 3906539128-0
                                                                      • Opcode ID: 0cb9df2e8624d4294b8a3556b08f1caa9dc96c539edeb0e7637bb9f88e3f217c
                                                                      • Instruction ID: 9d87d96ec349345e5fbf76029f293e1408fbdf9f19d795574f5345526ec71940
                                                                      • Opcode Fuzzy Hash: 0cb9df2e8624d4294b8a3556b08f1caa9dc96c539edeb0e7637bb9f88e3f217c
                                                                      • Instruction Fuzzy Hash: 9531C5749512299BCB21DF68DC897CCBBB8BF08750F5041EAE41CAB290EB749F958F44
                                                                      APIs
                                                                      • FormatMessageW.KERNEL32(00001300,00000000,00000007,00000400,?,00000000,00000000,2DDDF7D7,00000000,?), ref: 0026975B
                                                                      • GetLastError.KERNEL32 ref: 00269765
                                                                        • Part of subcall function 00243620: RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateErrorFormatHeapLastMessage
                                                                      • String ID:
                                                                      • API String ID: 4114510652-0
                                                                      • Opcode ID: ca5365b11ad8b43843cf0e12691cfa1eb6eb086c5fdade9ee0f513f677b9b992
                                                                      • Instruction ID: f33858ed3cee36c8c59c5c8e6ad52de0fc75bce9c8fda80c990ebfebd778fc14
                                                                      • Opcode Fuzzy Hash: ca5365b11ad8b43843cf0e12691cfa1eb6eb086c5fdade9ee0f513f677b9b992
                                                                      • Instruction Fuzzy Hash: DC41E071A142099FDB14CF98DC457AEFBB8FB44714F10016EE919EB380EBB59D448B90
                                                                      APIs
                                                                      • GetSystemTimePreciseAsFileTime.KERNEL32(?,002B4122,?,?,?,?,002B40E1,000000FF,?,?,?,002B41F4,00000000,?), ref: 002B438D
                                                                      • GetSystemTimeAsFileTime.KERNEL32(?,2DDDF7D7,?,?,002E6272,000000FF,?,002B4122,?,?,?,?,002B40E1,000000FF,?), ref: 002B4391
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Time$FileSystem$Precise
                                                                      • String ID:
                                                                      • API String ID: 743729956-0
                                                                      • Opcode ID: 8edcff02d2985f0fe896ed0dee57abdcf7d1ed9cf85af9674e72ad157bb34991
                                                                      • Instruction ID: af9de4f7a8acc0b960fbbd9ac042e27352c4cb7625b5f2c448830937d404fd5f
                                                                      • Opcode Fuzzy Hash: 8edcff02d2985f0fe896ed0dee57abdcf7d1ed9cf85af9674e72ad157bb34991
                                                                      • Instruction Fuzzy Hash: D2F0A032A48554EFCB129F44DC44B9DBBA8F709B50F000666EC0297690DB74A9008A90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: l%
                                                                      • API String ID: 0-3230761376
                                                                      • Opcode ID: 2b747808e54cfda2a8be659db6fd8c762fabaec49ae651353f695398b9248a4b
                                                                      • Instruction ID: e240300d810ad17a3234643af020aa7a584fa5eaa8b391749d860541a3fc54c9
                                                                      • Opcode Fuzzy Hash: 2b747808e54cfda2a8be659db6fd8c762fabaec49ae651353f695398b9248a4b
                                                                      • Instruction Fuzzy Hash: 0222C2B3B543104BD75CCE5DCCA23ADB2D3ABD4218B0E853DB48AC3342EA7DD9598685
                                                                      APIs
                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,00000008,?,?,?,002C91AE,?,?,00000008,?,?,002D449E,00000000), ref: 002C9408
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionRaise
                                                                      • String ID:
                                                                      • API String ID: 3997070919-0
                                                                      • Opcode ID: 9043a3e077060e196c335d11eb7c49cc234a95affe1abaac7942a703889fb2bc
                                                                      • Instruction ID: 837bef22f9b619af4ec71cc05144dd202d479f5c48d6ff65e159251961cdb0c4
                                                                      • Opcode Fuzzy Hash: 9043a3e077060e196c335d11eb7c49cc234a95affe1abaac7942a703889fb2bc
                                                                      • Instruction Fuzzy Hash: D4B148315206099FD719CF28C49AB65BBA0FF45364F24879CE89A8F2E1C375E9D2CB40
                                                                      APIs
                                                                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 002B4E16
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: FeaturePresentProcessor
                                                                      • String ID:
                                                                      • API String ID: 2325560087-0
                                                                      • Opcode ID: 769229badae39683eb9f00de35d2d1664ef2983b6331a74abd11f1daac3c93a9
                                                                      • Instruction ID: cbc90b175af1a08d887b115ae6bb7e44f82c443f15723fc5404b18245d5853fd
                                                                      • Opcode Fuzzy Hash: 769229badae39683eb9f00de35d2d1664ef2983b6331a74abd11f1daac3c93a9
                                                                      • Instruction Fuzzy Hash: 0DA17BB1A266168FDB19CF59D8D17A9BBF4FB48354F14892AD405EB390D3B49840CF60
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8e583062468522b7eea217071335d4c11cbeb41001fe1e80af8c5f703de3f0fc
                                                                      • Instruction ID: a1d49efd0e40852167e7b30cc3d3dc8be23799671cdf49e459cb603c8eca7f19
                                                                      • Opcode Fuzzy Hash: 8e583062468522b7eea217071335d4c11cbeb41001fe1e80af8c5f703de3f0fc
                                                                      • Instruction Fuzzy Hash: B8312B7591021DAFDB24DFA8CC88EAB777DEF84350F24466DF80997244EA309D50CB50
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00001001,?,00000078), ref: 002CF970
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID:
                                                                      • API String ID: 2299586839-0
                                                                      • Opcode ID: 6098b8c053c0e1227c3b5bd9c5a27c09f7c4a9777d49483953852e028e482679
                                                                      • Instruction ID: 4dee16e23a4e2f7e2da9f474fd9ee37c6de79c7f8c85c3a81011ef6a8fd7cea8
                                                                      • Opcode Fuzzy Hash: 6098b8c053c0e1227c3b5bd9c5a27c09f7c4a9777d49483953852e028e482679
                                                                      • Instruction Fuzzy Hash: 30217F32620206BBEF649E25DE86FBA73A9EF44344F20027EFD05D6151EB74AD609B50
                                                                      APIs
                                                                      • EnumSystemLocalesW.KERNEL32(002CF6C0,00000001,00000000,?,-00000050,?,002CFD03,00000000,?,?,?,00000055,?), ref: 002CF600
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: EnumLocalesSystem
                                                                      • String ID:
                                                                      • API String ID: 2099609381-0
                                                                      • Opcode ID: bfa1bbcf6f3564d62d7c7dc56b2b5885b9b7acc5e2cdd7a0cb274c9082644e08
                                                                      • Instruction ID: 1c94bdcc3f616fab91e88ec511c470d25e76e70b74f716a1d5bab2d6432f3602
                                                                      • Opcode Fuzzy Hash: bfa1bbcf6f3564d62d7c7dc56b2b5885b9b7acc5e2cdd7a0cb274c9082644e08
                                                                      • Instruction Fuzzy Hash: 0D1155362107025FDB189F38D891ABAB792FF80358B14463DEA8687A40D331A812CB40
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,002CF9C6,00000000,00000000,?), ref: 002CFB77
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID:
                                                                      • API String ID: 2299586839-0
                                                                      • Opcode ID: e9b9bb76f976d978939d02bfe025d280abfce3a5b098e194ec6dca88bf74be17
                                                                      • Instruction ID: 56e016f103ab9ff30b86640693b44f3c3cde31f0f63c24046d6a38c249cffad3
                                                                      • Opcode Fuzzy Hash: e9b9bb76f976d978939d02bfe025d280abfce3a5b098e194ec6dca88bf74be17
                                                                      • Instruction Fuzzy Hash: 8C012B33A20113ABDB285E20C955FBA7769DB44318F15457CAC06E3180DB70FD51CA90
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00001002,?,00000078,-00000050,00000000,000000D0), ref: 002CF4F0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID: utf8
                                                                      • API String ID: 2299586839-905460609
                                                                      • Opcode ID: 13dd44eef78293e7739b186f3455be9725e09acae419384430028c425d477287
                                                                      • Instruction ID: fc73797d27db14c065331b1c0c471fb56a5043e98d161ca00cb9feee8b4aeb74
                                                                      • Opcode Fuzzy Hash: 13dd44eef78293e7739b186f3455be9725e09acae419384430028c425d477287
                                                                      • Instruction Fuzzy Hash: 75F0C832A61204AFEB10AB34DD4AFBA73ECDB44355F11017AFA06DB141EAB4AD159B90
                                                                      APIs
                                                                      • EnumSystemLocalesW.KERNEL32(002CF920,00000001,?,?,-00000050,?,002CFCCB,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 002CF673
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: EnumLocalesSystem
                                                                      • String ID:
                                                                      • API String ID: 2099609381-0
                                                                      • Opcode ID: c058dcfabe780585e0c123e5adf4b3c0400c4d5eabafbd4e9b6d5c4e85f7c090
                                                                      • Instruction ID: da3dafce436aa64b241c5139493a3cd27ea5ba3cc914da8092a2459b0e1df166
                                                                      • Opcode Fuzzy Hash: c058dcfabe780585e0c123e5adf4b3c0400c4d5eabafbd4e9b6d5c4e85f7c090
                                                                      • Instruction Fuzzy Hash: 94F0F6362103055FDB149F35DC86F7A7B9AEF80368B25463CF9458B6A0D6B1AC12DB50
                                                                      APIs
                                                                      • EnumSystemLocalesW.KERNEL32(002CF4A0,00000001,?,?,?,002CFD25,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 002CF57A
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: EnumLocalesSystem
                                                                      • String ID:
                                                                      • API String ID: 2099609381-0
                                                                      • Opcode ID: 3307f087016009e9e1082945b08e173854532dd3d234d8f2f51639f195ad82d1
                                                                      • Instruction ID: 2d24bfc9703d0cb933467b7f804f84e57bbfdea01bf461a98e7ae2ee07706b2c
                                                                      • Opcode Fuzzy Hash: 3307f087016009e9e1082945b08e173854532dd3d234d8f2f51639f195ad82d1
                                                                      • Instruction Fuzzy Hash: D5F0553A34030557CB089F39D849B7ABF95EFC1764B46406CEB098B240C6319842CB90
                                                                      APIs
                                                                        • Part of subcall function 002C2301: EnterCriticalSection.KERNEL32(-003100C0,?,002C48AB,00243AB6,0030ACC8,0000000C,002C4B87,?), ref: 002C2310
                                                                      • EnumSystemLocalesW.KERNEL32(002C6EA0,00000001,0030ADE8,0000000C,002C7387,00000000), ref: 002C6EF4
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                      • String ID:
                                                                      • API String ID: 1272433827-0
                                                                      • Opcode ID: 5e74d5066b5f437674107d919ad117162b88aa306420a3f005657fa57124262e
                                                                      • Instruction ID: 384a9db83a56410f5013a12d841edfeece9d941e8fd481ce59495ea9e0744dd1
                                                                      • Opcode Fuzzy Hash: 5e74d5066b5f437674107d919ad117162b88aa306420a3f005657fa57124262e
                                                                      • Instruction Fuzzy Hash: 2BF06D36A50300DFE704EF99E486F9D77B0EB48726F10811AF5119B2A1CBB959008F90
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,002C61AA,?,20001004,00000000,00000002,?,?,002C57A8), ref: 002C73FD
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID:
                                                                      • API String ID: 2299586839-0
                                                                      • Opcode ID: e08f23ce3c511d2943b7fbc3761e478b0b1e4db19ac1daaa605c941df8536822
                                                                      • Instruction ID: e425cb55f87a1a7310841dd508a944ddecbdffd1443f4d40cb96c45433e91e04
                                                                      • Opcode Fuzzy Hash: e08f23ce3c511d2943b7fbc3761e478b0b1e4db19ac1daaa605c941df8536822
                                                                      • Instruction Fuzzy Hash: 37E04F31558168BBCF122F60EC09F9E3E2AEF447A0F008118FD1566160CB728D31AEE5
                                                                      APIs
                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00025C80), ref: 0024CEBB
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled
                                                                      • String ID:
                                                                      • API String ID: 3192549508-0
                                                                      • Opcode ID: 652f109d89e7f78036f23155d684291bf1859e3d5d6d43e0948cc44bc11ed5d8
                                                                      • Instruction ID: ba52e1796a5c7fa486923fefcedad08dd5a10ff298897ecee628e74660542ddc
                                                                      • Opcode Fuzzy Hash: 652f109d89e7f78036f23155d684291bf1859e3d5d6d43e0948cc44bc11ed5d8
                                                                      • Instruction Fuzzy Hash: 33D022306BD3814AE31E4B38AD0DB803E80071230CF085006E406012C2CBF428F08713
                                                                      APIs
                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000754E0,002B4BC5), ref: 002B54D4
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled
                                                                      • String ID:
                                                                      • API String ID: 3192549508-0
                                                                      • Opcode ID: 78746a139082d390a8d11139183a2f6e0ac6a9becf8018b345cee7c213d52dda
                                                                      • Instruction ID: be025c39a43cba6cd9c1d7dd351aa18e2435692f61b4f76d2b0dae67d07cf518
                                                                      • Opcode Fuzzy Hash: 78746a139082d390a8d11139183a2f6e0ac6a9becf8018b345cee7c213d52dda
                                                                      • Instruction Fuzzy Hash:
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6453403380a7b34aadd2ec5b6f4e6fc514050c8fed5f45670e5b1e22cf39ce5a
                                                                      • Instruction ID: b14648c09cdfc91fbd42b750968782fc7bfa0924bf10c6dd97ebd1e97735b8d6
                                                                      • Opcode Fuzzy Hash: 6453403380a7b34aadd2ec5b6f4e6fc514050c8fed5f45670e5b1e22cf39ce5a
                                                                      • Instruction Fuzzy Hash: 8F228D71E10219DFCF15DF98C884AAEBBB5BF89310F244169E815AB351DB70AD51CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3b90fb879b8a8ea003658af5eef9001548811b57cd40964113baebda285a45c9
                                                                      • Instruction ID: 805aa1b1cba8747fd9704f10cfa1c6f1c8628e1c727f53d15e8ffe92658c10d6
                                                                      • Opcode Fuzzy Hash: 3b90fb879b8a8ea003658af5eef9001548811b57cd40964113baebda285a45c9
                                                                      • Instruction Fuzzy Hash: F8325771E10259DFCF15DFA8C884AAEBBB5BF49310F2440A9E805AB351DB71AD11CFA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1b8076dd7ca720b42ae06c3f8efee0de5e73b0c5de5720f7eb9c3b1b3a1ca7cf
                                                                      • Instruction ID: 914b9609b7167ba4ef520c491a38639885cb18e0ad33cdee5fb8ff1fcc3dfe0f
                                                                      • Opcode Fuzzy Hash: 1b8076dd7ca720b42ae06c3f8efee0de5e73b0c5de5720f7eb9c3b1b3a1ca7cf
                                                                      • Instruction Fuzzy Hash: 48327870910249DFDF14DF58C994BADBBB1BF49308F148199E8099B392CB75A968CF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6fe832cafeae4252b426330cf67226a48b717919387d1670b98870811c6abd5d
                                                                      • Instruction ID: 924a0c24261f98fa65c9196233033cb7d532b415ead03688acdf1702b3fe0c83
                                                                      • Opcode Fuzzy Hash: 6fe832cafeae4252b426330cf67226a48b717919387d1670b98870811c6abd5d
                                                                      • Instruction Fuzzy Hash: 3002D072B286218BDB0CCE19C49033ABBE7BBC9705F154A2DE49797384CE70D955CB86
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7471089b39a0c606a1ead41c5972f56f77b679b77ddc466d9b28eb3e4bb7b9c1
                                                                      • Instruction ID: 59491522af68f2eea7622e4df4fe50f2e6fbe0d8a3a5f30cd3876718a404353f
                                                                      • Opcode Fuzzy Hash: 7471089b39a0c606a1ead41c5972f56f77b679b77ddc466d9b28eb3e4bb7b9c1
                                                                      • Instruction Fuzzy Hash: 3A023B71E1021A9FDF14CFA8D8806EDFBB1FF88354F24826AD915AB344D731AA51CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3ca69180bb57cccfb2e6c13dd4c0cecf0bd6cf031ae4c6ec8b8075e5c1f824ff
                                                                      • Instruction ID: 5bcbb023becb17ae1cc856d2f7a4eed245863ce2455327b587413d1f0764d624
                                                                      • Opcode Fuzzy Hash: 3ca69180bb57cccfb2e6c13dd4c0cecf0bd6cf031ae4c6ec8b8075e5c1f824ff
                                                                      • Instruction Fuzzy Hash: 6102DF70A206068FCF24DF28C480AFAB7F1FF48394F254A59D45BAB291D771AC62CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f4911864617fdf83a06b6adce574f5103a532950a914ed70c71664c61b15ba0a
                                                                      • Instruction ID: 703e5deda353bac6a99e6f3d9049a5b88a6309f9691340991b815ee02211453d
                                                                      • Opcode Fuzzy Hash: f4911864617fdf83a06b6adce574f5103a532950a914ed70c71664c61b15ba0a
                                                                      • Instruction Fuzzy Hash: 6C023F72A083018BC75CCF19D89056BF7E2BFCC314F19892EF89A93355DB70A955CA86
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b8a8202252df956a005388096f879b4c09ec12c0603b9b94b3cd752c41ff1f0d
                                                                      • Instruction ID: c4aab84fc30a4a2348581f7a5ddd755258eb0c13402d274209f148a3c0254b59
                                                                      • Opcode Fuzzy Hash: b8a8202252df956a005388096f879b4c09ec12c0603b9b94b3cd752c41ff1f0d
                                                                      • Instruction Fuzzy Hash: E1E10F749206078FCB28CF68C484AFABBB1FF14394F14861ED4969B691E775EC62CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e206b806fc2f2d15c42555acfeba3d2c160a7d8809909fbe2a5ce934a7d32e61
                                                                      • Instruction ID: 3dbcb43ebc07f7a2df056e3d4297a7d14ff5176b0d1b16932cb6af7de9da5a27
                                                                      • Opcode Fuzzy Hash: e206b806fc2f2d15c42555acfeba3d2c160a7d8809909fbe2a5ce934a7d32e61
                                                                      • Instruction Fuzzy Hash: 11E19C72A18305CFC718CF19D49056AFBE2BFD9310F198A6DE88A57394CA70AD1DCB85
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4f79f5fec76a827348ddce4bf634d1cead62ca974fa53a81a2a47e8160ea0b21
                                                                      • Instruction ID: 755f6d50b5a42d4188d396e819d99ffc9b385b7767f547a89cd88c277aa42c7f
                                                                      • Opcode Fuzzy Hash: 4f79f5fec76a827348ddce4bf634d1cead62ca974fa53a81a2a47e8160ea0b21
                                                                      • Instruction Fuzzy Hash: 19F191705142A18BD749CF1AE8E04AB77E1FBCD311F458A0EF58687395C734E626CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1557de346b51a715020df214854dc7e53798be9dd99d05bffbebc2292b48854d
                                                                      • Instruction ID: 9ef6722512528afb7a53b1ed9ee7f22411d458d109993d5b8165a0b020d5b8db
                                                                      • Opcode Fuzzy Hash: 1557de346b51a715020df214854dc7e53798be9dd99d05bffbebc2292b48854d
                                                                      • Instruction Fuzzy Hash: 7291C832C20E4A8ADB12CF68C849BDEB772AF46360F298349DC597F291D77498E5C750
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6260f7346573ee0492d7d087c9a02f31b07962f178dacaa3a5896be440bf1b46
                                                                      • Instruction ID: 56a460836c3f9a0e4b2822ed7c17841ad88960cf348009d410f8dde5208d4f4e
                                                                      • Opcode Fuzzy Hash: 6260f7346573ee0492d7d087c9a02f31b07962f178dacaa3a5896be440bf1b46
                                                                      • Instruction Fuzzy Hash: 11717071A246168FDB18CF28C48062AB7E1FFD4354F168A2EE856D7354D730E964CBC1
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d2d934bc695e1d0d50cbc75462444d9697a9e6472ccb29cd5305cced352182a1
                                                                      • Instruction ID: ccc47d0f853d89b22338dea3d480a3ecb34185ba569be27832da047eeb1df2df
                                                                      • Opcode Fuzzy Hash: d2d934bc695e1d0d50cbc75462444d9697a9e6472ccb29cd5305cced352182a1
                                                                      • Instruction Fuzzy Hash: 5E713E76E201298FDF18CF6DC8805ADB7F5FB48310F5A4669E815EB354E770A910CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ca6a5bc58de809013063d6a2681a055a54a9f030fd3cdf8c7f79c10b0e74bf7e
                                                                      • Instruction ID: 3936c47df6e1ad503fc24541205be2746f50d67742c30e498a7536bdc5a2c664
                                                                      • Opcode Fuzzy Hash: ca6a5bc58de809013063d6a2681a055a54a9f030fd3cdf8c7f79c10b0e74bf7e
                                                                      • Instruction Fuzzy Hash: 58414B72B143610BCF148E2C8CE4269BAD29BD6325F0B877DD89A97381D9B48C1EC791
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 59845c80f73a15e3b05cb42bff5b3d653e629c8e708305577ecb24b55e42dd06
                                                                      • Instruction ID: f826a67953b8fc306aeb98bfd838b41f8b3848833cd5af4951fff1bff9aa0a8b
                                                                      • Opcode Fuzzy Hash: 59845c80f73a15e3b05cb42bff5b3d653e629c8e708305577ecb24b55e42dd06
                                                                      • Instruction Fuzzy Hash: 4341B472B2421A4BEB0CDF2DD84093AB3EABBE4304F56862DE506C7254FB70D925C6C5
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 28382760f5826ba8b86f3d3185c11f78971d9eb01ebd0ef70525be43b5095a9f
                                                                      • Instruction ID: 6ff2b293f63db8304fb3f4801efe7cd8fd4e121cdec4c6bfdd3556c57b272a93
                                                                      • Opcode Fuzzy Hash: 28382760f5826ba8b86f3d3185c11f78971d9eb01ebd0ef70525be43b5095a9f
                                                                      • Instruction Fuzzy Hash: C3317871A102721FDB50CE1E8C44535BBD5EBCA311F8A41BAE4F4CB342D638DA0797A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6b46043004ac8ee5073276c9609b340daa0962de972f7f21fc85175d3f0f8ee2
                                                                      • Instruction ID: 7994ca3947f680634f015d1431a1f65be65f02f32869516c26c44ef250ef3cc5
                                                                      • Opcode Fuzzy Hash: 6b46043004ac8ee5073276c9609b340daa0962de972f7f21fc85175d3f0f8ee2
                                                                      • Instruction Fuzzy Hash: A02107367709020B9B8CCB2DDC766B932D5E78D301788D67DEA5BCB291E7388525C740
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f3395c45eef9510d8e6ba7a1e4d1d4521fa8a1af8b18e96eb7d1c28856ff8121
                                                                      • Instruction ID: f110f49c1cb3329c00f9dc9c21019dadcf8871cd7a8d4e71d76144df1074f951
                                                                      • Opcode Fuzzy Hash: f3395c45eef9510d8e6ba7a1e4d1d4521fa8a1af8b18e96eb7d1c28856ff8121
                                                                      • Instruction Fuzzy Hash: BF2192719202235BD21ACE1DC8445B6F795FF86305F81832AED8097249CB39E835D7D0
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9e12790dad87ec2532e809a9eef8ff034ad4c78d338c3fea1aea289e885726f6
                                                                      • Instruction ID: 2fd3730a4c63b1272fe99ab03083072b0e5059c838ed207843ed3deb0490e6f7
                                                                      • Opcode Fuzzy Hash: 9e12790dad87ec2532e809a9eef8ff034ad4c78d338c3fea1aea289e885726f6
                                                                      • Instruction Fuzzy Hash: 621148315202324BD719CD2CD888676B394EF8A315F86836AED41AB148CB25FC35C3E1
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,2DDDF7D7,?,00000000), ref: 00296ACD
                                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296AEB
                                                                      • GetFileTime.KERNEL32(00000000,00000000,00000000,00290E15,?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF), ref: 00296B0C
                                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296B16
                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296B34
                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296BA0
                                                                      • FileTimeToSystemTime.KERNEL32(00290E15,002F8E10,?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?), ref: 00296BB5
                                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296BBF
                                                                      • SystemTimeToFileTime.KERNEL32(002F8E10,00290E15,?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?), ref: 00296C26
                                                                      • SystemTimeToFileTime.KERNEL32(002F8DFE,002F2ECC,?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?), ref: 00296C47
                                                                      • CompareFileTime.KERNEL32(002F2ECC,00290E15,?,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?), ref: 00296C5D
                                                                      • PathFileExistsW.SHLWAPI(00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296CCF
                                                                      • CreateFileW.KERNEL32(00000000,C0000000,00000000,0000000C,00000002,00000080,00000000,S-1-5-18,?,00000001,S-1-1-0,?,00000001), ref: 00296D3B
                                                                      • GetLastError.KERNEL32(?,00000001,S-1-1-0,?,00000001,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15), ref: 00296D4D
                                                                      • CloseHandle.KERNEL32(00000000,?,00000001,S-1-1-0,?,00000001,?,?,?,?,?,?,?,002E3B2D,000000FF), ref: 00296D59
                                                                      • CopyFileExW.KERNEL32(?,00000000,00297340,002F8DA8,00000000,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF), ref: 00296D91
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296D9B
                                                                      • DeleteFileW.KERNEL32(002F89C4,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296E44
                                                                      • MoveFileW.KERNEL32(00000000,002F89C4), ref: 00296E4F
                                                                      • CopyFileW.KERNEL32(00000000,002F89C4,00000000,?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296E5F
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,002E3B2D,000000FF,?,00290E15,?,?), ref: 00296E69
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$Time$ErrorLast$CloseHandleSystem$CopyCreate$CompareDeleteExistsMovePath
                                                                      • String ID: .part$S-1-1-0$S-1-5-18
                                                                      • API String ID: 1792433798-2727065896
                                                                      • Opcode ID: b038db02740481170ff7e169939498d9336bc6fd0f0ab225e2542200432d9066
                                                                      • Instruction ID: 189f118a78aeb6afa00616b43027a1333e11504f0db4324fc8d52f6604ad6fbb
                                                                      • Opcode Fuzzy Hash: b038db02740481170ff7e169939498d9336bc6fd0f0ab225e2542200432d9066
                                                                      • Instruction Fuzzy Hash: FCF19970A502569FDF15DFA4DC8CBAEBBF4AF08310F144169E901AB2D1DB70AD94CBA1
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00295F3D
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00295F52
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00295F69
                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00295F82
                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00295F96
                                                                      • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 00295FA4
                                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00295FB7
                                                                      • GetDlgItem.USER32(?,0000E801), ref: 00295FC4
                                                                      • IsWindow.USER32(00000000), ref: 00295FCD
                                                                      • DestroyWindow.USER32(00000000,?,00000000), ref: 00295FE9
                                                                      • GetClientRect.USER32(?,800040FD), ref: 00296041
                                                                      • GetDlgItem.USER32(?,0000E801), ref: 00296060
                                                                      • IsWindow.USER32(00000000), ref: 00296067
                                                                      • CreateWindowExW.USER32(00000000,SCROLLBAR,00000000,5402001C,?,?,?,?,?,0000E801,00000000), ref: 002960AC
                                                                      • IsWindow.USER32(00000000), ref: 002960B5
                                                                      • GetWindowRect.USER32(00000000,800040ED), ref: 002960D1
                                                                      • MapWindowPoints.USER32(00000000,00000001,800040ED,00000002), ref: 002960E6
                                                                      • GetClientRect.USER32(?,800040ED), ref: 00296143
                                                                      • GetWindowRect.USER32(?,800040ED), ref: 0029614B
                                                                      • GetDlgItem.USER32(FFFFFFFF,0000042B), ref: 002961E3
                                                                      • GetWindowRect.USER32(00000000,800040ED), ref: 002961F7
                                                                      • MapWindowPoints.USER32(00000000,00000000,800040ED,00000002), ref: 0029620C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$LongRect$Item$ClientMessagePointsSend$CreateDestroy
                                                                      • String ID: SCROLLBAR
                                                                      • API String ID: 3826962570-324577739
                                                                      • Opcode ID: 741adc15c345e51bc9d0f91639d9af35b369e46d94fdcf3aa9c0b8891c51c49d
                                                                      • Instruction ID: ce6582a91b173ee0118388983ecf79d4353ae4435d2c259da736108faf5be013
                                                                      • Opcode Fuzzy Hash: 741adc15c345e51bc9d0f91639d9af35b369e46d94fdcf3aa9c0b8891c51c49d
                                                                      • Instruction Fuzzy Hash: 04B17970618341AFEB50DF28D888B5ABBF5FF89310F104A1DF995D72A0DB71A854CB92
                                                                      APIs
                                                                      • CoTaskMemAlloc.OLE32(?,2DDDF7D7,?,00000000,00000000), ref: 00260C79
                                                                      • CharNextW.USER32(?,00000000,00000000), ref: 00260CF8
                                                                      • CharNextW.USER32(00000000,?,00000000,00000000), ref: 00260D01
                                                                      • CharNextW.USER32(00000000,?,00000000,00000000), ref: 00260D0A
                                                                      • CharNextW.USER32(00000000,?,00000000,00000000), ref: 00260D13
                                                                      • CharNextW.USER32(?,?,00000000,00000001,2DDDF7D7,?,00000000,00000000), ref: 00260D5D
                                                                      • CharNextW.USER32(?,?,00000000,00000001,2DDDF7D7,?,00000000,00000000), ref: 00260D71
                                                                      • CharNextW.USER32(00000000,}},00000009,?,00000000,00000001,2DDDF7D7,?,00000000,00000000), ref: 00260DEE
                                                                      • CharNextW.USER32(00000000,?,00000000,00000001,2DDDF7D7,?,00000000,00000000), ref: 00260E27
                                                                      • EnterCriticalSection.KERNEL32(0000001B,00000001,2DDDF7D7,?,00000000,00000000), ref: 00260E70
                                                                      • lstrcmpiW.KERNEL32(?,?,?,00000000,00000000), ref: 00260E8A
                                                                      • LeaveCriticalSection.KERNEL32(0000001B,?,00000000,00000000), ref: 00260E9E
                                                                      • LeaveCriticalSection.KERNEL32(0000001B,?,00000000,00000000), ref: 00260ECE
                                                                      • CharNextW.USER32(00000000,?,?), ref: 00260F21
                                                                      • CharNextW.USER32(?,00000000,00000001,2DDDF7D7,?,00000000,00000000), ref: 00260F44
                                                                      • CoTaskMemFree.OLE32(00000000,2DDDF7D7,?,00000000,00000000), ref: 00260F92
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$CriticalSection$LeaveTask$AllocEnterFreelstrcmpi
                                                                      • String ID: }}$HKCR$HKCU{Software{Classes
                                                                      • API String ID: 3576304915-1142484189
                                                                      • Opcode ID: 82b66779ce0b0830498912bb0e82dbe434a5e9815755130ef24ff097772111c5
                                                                      • Instruction ID: d5e3d8ce3a53966d3f754f69a0f254f6a2cdeef210cbb705bc527c24ecf57d68
                                                                      • Opcode Fuzzy Hash: 82b66779ce0b0830498912bb0e82dbe434a5e9815755130ef24ff097772111c5
                                                                      • Instruction Fuzzy Hash: 5ED1C3709243569FCB24DFA4D8C8BAFBBB4EF08700F240569E845DB281DB719DA4DB90
                                                                      APIs
                                                                      • InitializeCriticalSection.KERNEL32(00310AF0,2DDDF7D7), ref: 0026BDB3
                                                                      • EnterCriticalSection.KERNEL32(00310AF0,2DDDF7D7), ref: 0026BDC8
                                                                      • GetCurrentProcess.KERNEL32 ref: 0026BDD5
                                                                      • GetCurrentThread.KERNEL32 ref: 0026BDE3
                                                                      • SymSetOptions.IMAGEHLP(80000016), ref: 0026BE0F
                                                                      • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr,00000000), ref: 0026BE7D
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0026BE84
                                                                      • SymInitialize.IMAGEHLP(00000000,00000000,00000001,002F37C0,00000000), ref: 0026BECC
                                                                      • StackWalk.IMAGEHLP(0000014C,?,?,?,?,00000000,00000000,*** Stack Trace (x86) ***,?,?,?), ref: 0026C00F
                                                                      • GetModuleHandleW.KERNEL32(00000000,*** Stack Trace (x86) ***,?,?,?), ref: 0026C0C0
                                                                      • SymCleanup.IMAGEHLP(?,?), ref: 0026C1A2
                                                                      • LeaveCriticalSection.KERNEL32(00310AF0,?), ref: 0026C1CD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$CurrentInitialize$AddressCleanupEnterHandleLeaveLibraryLoadModuleOptionsProcProcessStackThreadWalk
                                                                      • String ID: *** Stack Trace (x86) ***$<--------------------MORE--FRAMES-------------------->$Dbghelp.dll$MODULE_BASE_ADDRESS$SymFromAddr$[0x%.8Ix]
                                                                      • API String ID: 4282195395-80696534
                                                                      • Opcode ID: 7ca70838e269df514213fdf07a757fef0aeef8c2f81dbbff9cd8fbc7d3773ebc
                                                                      • Instruction ID: 4aaea975c61490acd56f970ca37fc9882188938466d6c7209a544ed310598fee
                                                                      • Opcode Fuzzy Hash: 7ca70838e269df514213fdf07a757fef0aeef8c2f81dbbff9cd8fbc7d3773ebc
                                                                      • Instruction Fuzzy Hash: 6BC1EE709606689FDB21EF24DC88BEEBBB4AF06304F1041D8E508A7292DB742BD4CF51
                                                                      APIs
                                                                      • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,2DDDF7D7,?,?,?,?,?,?,?,?,2DDDF7D7,002D91F5,000000FF,?,0025A02A), ref: 0025AC93
                                                                      • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 0025AC99
                                                                      • LoadLibraryW.KERNEL32(combase.dll,CoIncrementMTAUsage,?,?,?,?,?,?,2DDDF7D7,002D91F5,000000FF,?,0025A02A,002F4350,2DDDF7D7), ref: 0025ACE0
                                                                      • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 0025ACE6
                                                                      • CoInitializeEx.OLE32(00000000,00000000,2DDDF7D7,?,?,?,002D922D,000000FF), ref: 0025B005
                                                                        • Part of subcall function 00258780: SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?), ref: 00258890
                                                                        • Part of subcall function 002B3148: GetCurrentThreadId.KERNEL32 ref: 002B3173
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProc$CurrentFolderInitializePathThread
                                                                      • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
                                                                      • API String ID: 2148253048-2454113998
                                                                      • Opcode ID: 32bc50f97469aebe8337b43c7afb604fb89393ef0775ed2478ec70e7efbe54d3
                                                                      • Instruction ID: 7b41572ffa99f3501842136655496fd668d5bc63c1ad574baabad2a9c4e0996f
                                                                      • Opcode Fuzzy Hash: 32bc50f97469aebe8337b43c7afb604fb89393ef0775ed2478ec70e7efbe54d3
                                                                      • Instruction Fuzzy Hash: A5D1D370D20209EFCB15EFA4D856BEEFBB4EF48711F144229E801A7290DB709E68CB55
                                                                      APIs
                                                                      • GetDlgItem.USER32(00000007,000001F6), ref: 00271458
                                                                      • GetDlgItem.USER32(00000007,000001F8), ref: 00271468
                                                                      • GetDlgItem.USER32(00000007,000001F7), ref: 002714AE
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 002714C1
                                                                      • ShowWindow.USER32(00000000,00000005), ref: 0027151F
                                                                      • GetDlgItem.USER32(00000007,000001F7), ref: 00271545
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00271558
                                                                      • ShowWindow.USER32(00000000,00000000), ref: 002715B5
                                                                      • ShowWindow.USER32(?,00000000), ref: 002715C0
                                                                      • SetWindowPos.USER32(00000007,00000000,00000000,00000000,?,?,00000616), ref: 0027160D
                                                                      • GetDlgItem.USER32(?,000000FF), ref: 00271640
                                                                      • IsWindow.USER32(00000000), ref: 0027164A
                                                                      • IsRectEmpty.USER32(?), ref: 00271667
                                                                      • SetWindowPos.USER32(000000FF,00000000,?,?,?,?,00000014,?,000000FF,?,?,00000616), ref: 00271697
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Item$Show$Text$EmptyRect
                                                                      • String ID: Details <<$Details >>
                                                                      • API String ID: 4171068809-3763984547
                                                                      • Opcode ID: c5e46d3ae70371c479d350a79686ad97bb726c86a3475e2f0c5dcf28350d0d78
                                                                      • Instruction ID: 141078ffa02131981bc8757be5a25f2610782d6cd5e583593efa2bb2016a608c
                                                                      • Opcode Fuzzy Hash: c5e46d3ae70371c479d350a79686ad97bb726c86a3475e2f0c5dcf28350d0d78
                                                                      • Instruction Fuzzy Hash: C981C171920204AFDB14DFA8DC89BAEBBB5EF44704F24825DF916A6691D730A960CF50
                                                                      APIs
                                                                      • InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,2DDDF7D7), ref: 0025FEE8
                                                                      • GetLastError.KERNEL32 ref: 0025FEF2
                                                                      • EnterCriticalSection.KERNEL32(?), ref: 0025FF64
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?), ref: 0025FF91
                                                                      • GetModuleFileNameW.KERNEL32(00240000,?,00000104), ref: 0025FFEA
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00260052
                                                                      • EnterCriticalSection.KERNEL32(?), ref: 00260063
                                                                      • EnterCriticalSection.KERNEL32(?), ref: 0026011B
                                                                      • LeaveCriticalSection.KERNEL32(?,Module,?), ref: 0026014F
                                                                      • EnterCriticalSection.KERNEL32(?), ref: 00260174
                                                                      • LeaveCriticalSection.KERNEL32(?,Module_Raw,?), ref: 002601A8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$Enter$Leave$Module$ErrorFileHandleInitializeLastName
                                                                      • String ID: 8F/$Module$Module_Raw$REGISTRY
                                                                      • API String ID: 2998937331-594715233
                                                                      • Opcode ID: b537ac742a50adce1b45d26fc69e127e511f05267425c7e391ccd3c8b2e464c8
                                                                      • Instruction ID: c860e1bcdf60f8cd3701435ca211f7e021c37de0696974f4d538ce89d9bb3c6e
                                                                      • Opcode Fuzzy Hash: b537ac742a50adce1b45d26fc69e127e511f05267425c7e391ccd3c8b2e464c8
                                                                      • Instruction Fuzzy Hash: CCB1BF31914318DBDB20DF64DD88B9EB7B4AF4A300F1441E9E90DA7A80E7759E94CF92
                                                                      APIs
                                                                      • GetDlgItem.USER32(00000000,?), ref: 00296685
                                                                      • GetWindowRect.USER32(00000000,80004109), ref: 00296695
                                                                      • MapWindowPoints.USER32(00000000,00000000,80004109,00000002), ref: 002966C1
                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 002969AE
                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 002969D7
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rect$InvalidateItemPoints
                                                                      • String ID:
                                                                      • API String ID: 2775623374-0
                                                                      • Opcode ID: 7a165b442808cbc864ae89fd66e4a23574f8f15f14de2f4f65e35d35c9e19de3
                                                                      • Instruction ID: ebe214f1c982ae90ec8c787de57bf15a9dd82c92fdc31cfbc8602874f72a7148
                                                                      • Opcode Fuzzy Hash: 7a165b442808cbc864ae89fd66e4a23574f8f15f14de2f4f65e35d35c9e19de3
                                                                      • Instruction Fuzzy Hash: B3D14B71618706AFDB08CF68D988B6ABBE5FF88304F088A2CF985D7254D770E854CB51
                                                                      APIs
                                                                      • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,2DDDF7D7,00000000,?,?,?,?,?,?,?,?,?,?,?,2DDDF7D7), ref: 00257273
                                                                      • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00257279
                                                                      • GetErrorInfo.OLEAUT32(00000000,00000000), ref: 002572D0
                                                                      • LoadLibraryW.KERNEL32(?,.dll,-00000001,00000000,002F37C0,00000000,00000000,00000000), ref: 0025743B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$AddressErrorInfoProc
                                                                      • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
                                                                      • API String ID: 3571556279-2454113998
                                                                      • Opcode ID: 4af80877861ea8b4576308e3c331b399272d232028f403477ee95b5045f85c41
                                                                      • Instruction ID: f31281e3902b7a81992dc00369381aa33953cd757800e6a7e36d4fe1190279b0
                                                                      • Opcode Fuzzy Hash: 4af80877861ea8b4576308e3c331b399272d232028f403477ee95b5045f85c41
                                                                      • Instruction Fuzzy Hash: BDB1AC70D6420AEFCB14DFA4E855BADBBB4FF48311F144169EC01A7290E770AD68CB94
                                                                      APIs
                                                                        • Part of subcall function 002698C0: LoadLibraryW.KERNEL32(ComCtl32.dll,2DDDF7D7,00000007,00000007,?), ref: 002698FA
                                                                        • Part of subcall function 002698C0: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00269920
                                                                        • Part of subcall function 002698C0: FreeLibrary.KERNEL32(00000000), ref: 002699A9
                                                                      • GetDlgItem.USER32(?,000001F4), ref: 0027112B
                                                                      • SendMessageW.USER32(00000000,00000170,00000000,00000000), ref: 0027113A
                                                                      • GetDC.USER32(00000000), ref: 00271146
                                                                      • GetDeviceCaps.GDI32(00000000), ref: 0027114D
                                                                      • MulDiv.KERNEL32(00000009,00000000), ref: 00271156
                                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,Courier New), ref: 0027117F
                                                                      • GetDlgItem.USER32(?,000001F6), ref: 00271190
                                                                      • IsWindow.USER32(00000000), ref: 00271199
                                                                      • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 002711B0
                                                                      • GetDlgItem.USER32(?,000001F8), ref: 002711BE
                                                                      • GetWindowRect.USER32(?,?), ref: 002711CD
                                                                      • GetWindowRect.USER32(00000000,?), ref: 002711E1
                                                                      • GetWindowRect.USER32(00000000,?), ref: 002711F5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ItemRect$LibraryMessageSend$AddressCapsCreateDeviceFontFreeLoadProc
                                                                      • String ID: Courier New
                                                                      • API String ID: 1731048342-2572734833
                                                                      • Opcode ID: 58bbec6b92532e36b0a9d178b3a43235de0cada95251af54b062a9e54f1b50b8
                                                                      • Instruction ID: 2650f37c6a1f7bbace3911c2d2d9af7d8efb6426adfb325baf2209528b8a4f6f
                                                                      • Opcode Fuzzy Hash: 58bbec6b92532e36b0a9d178b3a43235de0cada95251af54b062a9e54f1b50b8
                                                                      • Instruction Fuzzy Hash: 5D4197717D4341BBFB545F209C9AFAA37A9EF48B01F104568FB09AD1D2DAB0A8548B14
                                                                      APIs
                                                                      • LoadLibraryW.KERNEL32(Advapi32.dll), ref: 00264BA2
                                                                      • GetLastError.KERNEL32 ref: 00264BD0
                                                                        • Part of subcall function 00243620: RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      • GetProcAddress.KERNEL32(00000000,ConvertStringSidToSidW), ref: 00264BE6
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00264C02
                                                                      • GetLastError.KERNEL32 ref: 00264C0F
                                                                      • GetLastError.KERNEL32 ref: 00264E06
                                                                      • GetLastError.KERNEL32 ref: 00264E6B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$Library$AddressAllocateFreeHeapLoadProc
                                                                      • String ID: Advapi32.dll$ConvertStringSidToSidW
                                                                      • API String ID: 3460774402-1129428314
                                                                      • Opcode ID: 6ab0427c8b23b40076d5a2e32388be3d5c27fd66da93c044eab512b0ce8acaff
                                                                      • Instruction ID: c0df667d188e82e0ebf4f5e394d4268cc01e9429a2526ba2889a54c4de4e36a2
                                                                      • Opcode Fuzzy Hash: 6ab0427c8b23b40076d5a2e32388be3d5c27fd66da93c044eab512b0ce8acaff
                                                                      • Instruction Fuzzy Hash: 2EF19FB1C1125AEBDB00EF94D944BEEFBB4FF48310F204119E915B7281D771AAA4CBA1
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,2DDDF7D7,?,?,00000000), ref: 0029178F
                                                                      • GetLastError.KERNEL32 ref: 002917B0
                                                                        • Part of subcall function 00243620: RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 002917C0
                                                                      • GetLastError.KERNEL32 ref: 002917CD
                                                                      • CloseHandle.KERNEL32(?), ref: 00291A94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLast$AllocateCloseCreateHandleHeapSize
                                                                      • String ID: ISO-8859-1$US-ASCII$utf-16$utf-8
                                                                      • API String ID: 4082270022-3020978663
                                                                      • Opcode ID: 4860b3f21d57e0fb943747c984ed1416f5658e6d593ff7d23c8fa2ff7150170a
                                                                      • Instruction ID: 61c6441b47f2ec0e5d1697eba0e2688e1d39ae4249dafec3363409c6b293a665
                                                                      • Opcode Fuzzy Hash: 4860b3f21d57e0fb943747c984ed1416f5658e6d593ff7d23c8fa2ff7150170a
                                                                      • Instruction Fuzzy Hash: 48A1D470A10307AFDF10DFA6CC89BAEB7B9AF14350F144528E915AB391DB749D20CB61
                                                                      APIs
                                                                      • InitializeCriticalSection.KERNEL32(00310A68,2DDDF7D7,00000000,?), ref: 0026A78C
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • EnterCriticalSection.KERNEL32(?,2DDDF7D7,00000000,?), ref: 0026A799
                                                                      • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A7CB
                                                                      • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A7D4
                                                                      • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,002F4EF4,00000001,?,?,000000FF,00000000), ref: 0026A86C
                                                                      • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A875
                                                                      • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,?,?,000000FF,00000000), ref: 0026A8BD
                                                                      • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A8C6
                                                                      • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,002F37E8,00000002,?,?,000000FF,00000000), ref: 0026A935
                                                                      • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A93E
                                                                      • LeaveCriticalSection.KERNEL32(00000000,?,?,000000FF,00000000), ref: 0026A97A
                                                                        • Part of subcall function 00245350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0025E648,-00000010), ref: 00245373
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$BuffersFlushWrite$CriticalSection$EnterFindHeapInitializeLeaveProcessResource
                                                                      • String ID: 7/
                                                                      • API String ID: 3680465103-3756460529
                                                                      • Opcode ID: 9a3e3a670579fb4bef2ca50a23312f46f108c1d8cdfde4d79ad3cec3c87e3e04
                                                                      • Instruction ID: 18c7e2a9577c12a6bf63e59f48e30a7805656065edfcee4c53eb3edf565f055b
                                                                      • Opcode Fuzzy Hash: 9a3e3a670579fb4bef2ca50a23312f46f108c1d8cdfde4d79ad3cec3c87e3e04
                                                                      • Instruction Fuzzy Hash: 7571CE31A012459FDB01DF68DC89BAEBBB8FF44320F144198E911AB3A1DB349E55CFA1
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 002707A9
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 002707BE
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002707D4
                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 002707E7
                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 002707FA
                                                                      • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 00270808
                                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0027081B
                                                                      • GetClientRect.USER32(?,?), ref: 00270830
                                                                      • GetClientRect.USER32(?,?), ref: 00270858
                                                                      • GetWindowRect.USER32(?,?), ref: 00270860
                                                                      • GetDlgItem.USER32(?,?), ref: 00270897
                                                                      • IsWindow.USER32(00000000), ref: 002708A2
                                                                      • GetWindowRect.USER32(?,?), ref: 002708BD
                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 002708CE
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$Rect$ClientMessageSend$ItemPoints
                                                                      • String ID:
                                                                      • API String ID: 3417004906-0
                                                                      • Opcode ID: 3f7d2de904c6814bb502aab9ecbe1e10775225253ce85d412fcb988dd9f2e64a
                                                                      • Instruction ID: c7cb56c93a552835137cfda18e07b7895eef4f99db48ecf6fec7908b50f7976f
                                                                      • Opcode Fuzzy Hash: 3f7d2de904c6814bb502aab9ecbe1e10775225253ce85d412fcb988dd9f2e64a
                                                                      • Instruction Fuzzy Hash: F1418071558342DFD760DF64EC88B5BB7E4FF58310F208B1DF89A96291D730A8988B62
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0027BEE7
                                                                      • GetParent.USER32(00000000), ref: 0027BEFA
                                                                      • GetWindow.USER32(00000000,00000004), ref: 0027BF05
                                                                      • GetWindowRect.USER32(?,80004055), ref: 0027BF13
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0027BF26
                                                                      • MonitorFromWindow.USER32(?,00000002), ref: 0027BF3E
                                                                      • GetMonitorInfoW.USER32(00000000,8000402D), ref: 0027BF54
                                                                      • GetWindowRect.USER32(00000000,80004075), ref: 0027BF7A
                                                                      • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015), ref: 0027C035
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$LongMonitorRect$FromInfoParent
                                                                      • String ID:
                                                                      • API String ID: 1468510684-0
                                                                      • Opcode ID: 5dc3f5969aa1437f91c988f37414992b90d06bfad58e2061f97f177369ad7eee
                                                                      • Instruction ID: 42d277440ccbd3342584d01f5a1209005c7b5291127002501615fd843a33f510
                                                                      • Opcode Fuzzy Hash: 5dc3f5969aa1437f91c988f37414992b90d06bfad58e2061f97f177369ad7eee
                                                                      • Instruction Fuzzy Hash: 97518072914209AFDB11CF78DD89BAEBBB9FB44710F244269F815E7290DB30AD108B50
                                                                      APIs
                                                                      • GetLastError.KERNEL32 ref: 002909C2
                                                                      • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,00000000,.part,00000005,?,?,?), ref: 00290AFC
                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00290B31
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00290B55
                                                                      • ResetEvent.KERNEL32(?,00000000,002F8A34,00000000,00000000,00000000,00000000,00000000,?), ref: 00290E6B
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00290E94
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00290EA2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: FileObjectSingleWait$CloseCreateErrorEventHandleLastResetSize
                                                                      • String ID: #$.part$<
                                                                      • API String ID: 1885162932-1559421475
                                                                      • Opcode ID: 740d6029514921228aa95413cb25d7bd8ddfc38b6f0e31badbb0497402efb764
                                                                      • Instruction ID: 7eb861b7d46c4dbcfa837da18d9371465396e1bf32f9f3fd97a14a625352ac8d
                                                                      • Opcode Fuzzy Hash: 740d6029514921228aa95413cb25d7bd8ddfc38b6f0e31badbb0497402efb764
                                                                      • Instruction Fuzzy Hash: 29229030910659DFEF24CF64CC88BADBBB5BF09314F148299E509A7281DB70AE94CF91
                                                                      APIs
                                                                        • Part of subcall function 00244450: GetModuleHandleW.KERNEL32(Kernel32.dll,GetTempPath2W), ref: 00244547
                                                                        • Part of subcall function 00244450: GetProcAddress.KERNEL32(00000000), ref: 0024454E
                                                                        • Part of subcall function 00244450: PathFileExistsW.SHLWAPI(?), ref: 002445BC
                                                                        • Part of subcall function 00244850: GetTempFileNameW.KERNEL32(?,00000000,00000000,?,2DDDF7D7,?,00000004), ref: 002448C8
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,00000000), ref: 00275CCD
                                                                      • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00275CF5
                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,?,?,?,?,00000000), ref: 00275D37
                                                                      • CloseHandle.KERNEL32(?,?,00000000), ref: 00275DAA
                                                                      • ShellExecuteW.SHELL32(00000000,open,?,00000000,?,00000000), ref: 00275DDE
                                                                        • Part of subcall function 00245350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0025E648,-00000010), ref: 00245373
                                                                      • ShellExecuteExW.SHELL32(?), ref: 00275E36
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$Handle$CloseExecuteShell$AddressCreateExistsFindHeapModuleNamePathProcProcessResourceTempWrite
                                                                      • String ID: .bat$EXE$open$runas
                                                                      • API String ID: 1017135135-1492471297
                                                                      • Opcode ID: 1c41d5d0906230517dc83d1496c762fc197950ea11cf6bbbd11a1102f227ae46
                                                                      • Instruction ID: 0519819649e30ed8b860feced255d400b369afb91c17c73b82ceb48814676b87
                                                                      • Opcode Fuzzy Hash: 1c41d5d0906230517dc83d1496c762fc197950ea11cf6bbbd11a1102f227ae46
                                                                      • Instruction Fuzzy Hash: C4C1AD70900649DFDB04DF68C888B9DBBB5EF48324F248259F919AB2D1DBB49E05CF90
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CloseHandle$Event$ObjectSingleWait
                                                                      • String ID:
                                                                      • API String ID: 2663162059-0
                                                                      • Opcode ID: bab078901b3c68244054a291854f33b0abfbc487f77e629a849ce497a1ad9211
                                                                      • Instruction ID: 2421c21217043af958883ba951f8894bee11bff22af50047b77098e03f4beb18
                                                                      • Opcode Fuzzy Hash: bab078901b3c68244054a291854f33b0abfbc487f77e629a849ce497a1ad9211
                                                                      • Instruction Fuzzy Hash: A9114F34168782CBDBB05FB1FD8C7167BB4BF12355F104629E852CA4A0EB34D8548B60
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00259C08
                                                                      • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00259C12
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00259C24
                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00259C41
                                                                      • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00259C4B
                                                                      • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00259C58
                                                                      • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00259C62
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastProcess$CloseCodeCreateExitHandleHeapObjectSingleWait
                                                                      • String ID: "%s" %s$D
                                                                      • API String ID: 3234789809-3971972636
                                                                      • Opcode ID: fb97613d6550d2f7e42a21b170ad79bc85ed3d4ded56a891a6d7fa79eec3a44c
                                                                      • Instruction ID: 0191e07abdeefddc5217c0c50f429c8cf45cfb9d4196f766931b1a3324940be2
                                                                      • Opcode Fuzzy Hash: fb97613d6550d2f7e42a21b170ad79bc85ed3d4ded56a891a6d7fa79eec3a44c
                                                                      • Instruction Fuzzy Hash: 5451C071E10216DFDB14CF64DC44BAEB7B9FF48316F20462AED21A7280D770A995CB94
                                                                      APIs
                                                                      • GetErrorInfo.OLEAUT32(00000000,00000000,2DDDF7D7,00000000), ref: 0025517A
                                                                      • SysFreeString.OLEAUT32(00000001), ref: 00255200
                                                                      • SysFreeString.OLEAUT32(00000000), ref: 00255288
                                                                      • SysStringLen.OLEAUT32(00000000), ref: 002552B7
                                                                      • GetProcessHeap.KERNEL32(-000000FE,?), ref: 00255300
                                                                      • HeapFree.KERNEL32(00000000,-000000FE,?), ref: 00255306
                                                                      • GetProcessHeap.KERNEL32(-000000FE,00000000,?,00000000,00000000,00000000,2DDDF7D7,00000000), ref: 00255333
                                                                      • HeapFree.KERNEL32(00000000,-000000FE,00000000,?,00000000,00000000,00000000,2DDDF7D7,00000000), ref: 00255339
                                                                      • SysFreeString.OLEAUT32(00000000), ref: 00255351
                                                                      • SetErrorInfo.OLEAUT32(00000000,00000000), ref: 00255407
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Free$HeapString$ErrorInfoProcess
                                                                      • String ID:
                                                                      • API String ID: 1533966657-0
                                                                      • Opcode ID: b2685ccd354d001a88cd76ff17ab56d9118423dfa6a07c949e9dfce03a74ed44
                                                                      • Instruction ID: 7b17fa3cf88d8a59b669cefa8af7198f38e35ca5bfe294f3abb669cb23ffbd9f
                                                                      • Opcode Fuzzy Hash: b2685ccd354d001a88cd76ff17ab56d9118423dfa6a07c949e9dfce03a74ed44
                                                                      • Instruction Fuzzy Hash: D5A1BC70D2062AEFDB10DFA4C854BEEBBB8EF05311F144559EC15AB281D7B49E18CBA1
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00270F3E
                                                                      • DeleteObject.GDI32(?), ref: 00270F96
                                                                        • Part of subcall function 00270910: IsWindowVisible.USER32 ref: 00270926
                                                                        • Part of subcall function 00270910: SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 0027093C
                                                                        • Part of subcall function 00270910: GetWindowLongW.USER32(?,000000F0), ref: 00270946
                                                                        • Part of subcall function 00270910: GetDlgItem.USER32(?,?), ref: 002709B2
                                                                        • Part of subcall function 00270910: GetWindowRect.USER32(00000000,?), ref: 002709CA
                                                                        • Part of subcall function 00270910: MapWindowPoints.USER32(00000000,?,00000002,00000002), ref: 002709DB
                                                                      • EndDialog.USER32(?,00000000), ref: 00271016
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$DeleteDialogItemMessageObjectPointsRectSendVisible
                                                                      • String ID:
                                                                      • API String ID: 2368538989-0
                                                                      • Opcode ID: 981915bddc98e002ed6bb2c7934dd030e4328518a00b21a699adb438271f4e09
                                                                      • Instruction ID: 3d070077e1d022f1ed338cea83b724d337a7f49039e725d4d2094ee2d68ac8a9
                                                                      • Opcode Fuzzy Hash: 981915bddc98e002ed6bb2c7934dd030e4328518a00b21a699adb438271f4e09
                                                                      • Instruction Fuzzy Hash: 2141233236421557D7249E2EAC4DBBB3398EB85731F00876AFD5AC66D0CA72C87197A0
                                                                      APIs
                                                                      • GetDlgItem.USER32(?), ref: 0028D6DB
                                                                      • SendMessageW.USER32(00000000,00000406,00000000,?), ref: 0028D6EF
                                                                        • Part of subcall function 00294D20: GetWindowLongW.USER32(?,000000F0), ref: 00294D35
                                                                        • Part of subcall function 00294D20: GetParent.USER32(?), ref: 00294D43
                                                                      • GetDlgItem.USER32(?,0000040A), ref: 0028D719
                                                                        • Part of subcall function 0028CEB0: SetWindowLongW.USER32(?,000000FC,00000000), ref: 0028CEF3
                                                                        • Part of subcall function 0028CEB0: GetWindowLongW.USER32(?,000000F0), ref: 0028CF08
                                                                        • Part of subcall function 0028CEB0: SetWindowLongW.USER32(?,000000F0,00000000), ref: 0028CF20
                                                                        • Part of subcall function 0028CEB0: CreateWindowExW.USER32(00000000,tooltips_class32,00000000,00000000,80000000,80000000,00000000,00000000,?,00000000,00000000), ref: 0028CF5D
                                                                        • Part of subcall function 0028CEB0: IsWindow.USER32(00000000), ref: 0028CF67
                                                                        • Part of subcall function 0028CEB0: SendMessageW.USER32(?,00000401,00000001,00000000), ref: 0028CF7D
                                                                        • Part of subcall function 0028CA00: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0028CA3E
                                                                        • Part of subcall function 0028CA00: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0028CA4D
                                                                        • Part of subcall function 0027BEA0: GetWindowLongW.USER32(?,000000F0), ref: 0027BEE7
                                                                        • Part of subcall function 0027BEA0: GetParent.USER32(00000000), ref: 0027BEFA
                                                                        • Part of subcall function 0027BEA0: GetWindowRect.USER32(?,80004055), ref: 0027BF13
                                                                        • Part of subcall function 0027BEA0: GetWindowLongW.USER32(00000000,000000F0), ref: 0027BF26
                                                                        • Part of subcall function 0027BEA0: MonitorFromWindow.USER32(?,00000002), ref: 0027BF3E
                                                                        • Part of subcall function 0027BEA0: GetMonitorInfoW.USER32(00000000,8000402D), ref: 0027BF54
                                                                      • SetWindowTextW.USER32(?,?), ref: 0028D7C5
                                                                      • GetDlgItem.USER32(?,00000002), ref: 0028D80C
                                                                      • EnableWindow.USER32(00000000,00000000), ref: 0028D815
                                                                      • GetSystemMenu.USER32(?,00000000), ref: 0028D81F
                                                                      • ModifyMenuW.USER32(00000000,0000F060,00000001,00000000,00000000), ref: 0028D83D
                                                                      • DestroyMenu.USER32(00000000), ref: 0028D84F
                                                                      • SetEvent.KERNEL32(?,000000DA), ref: 0028D86A
                                                                        • Part of subcall function 0026F8E0: GetFileVersionInfoSizeW.KERNELBASE(?,?,2DDDF7D7,00000000,?,?,00000000,002DCCC5,000000FF,?,0027A745), ref: 0026F945
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$MessageSend$ItemMenu$InfoMonitorParent$CreateDestroyEnableEventFileFromModifyRectSizeSystemTextVersion
                                                                      • String ID:
                                                                      • API String ID: 3019886063-0
                                                                      • Opcode ID: c0ddf77dfa45edd0ac3d30d58e3604f3091a01ec6f74cc96ee3d663dc1c8b33f
                                                                      • Instruction ID: 5b6daf745049e7fe4f8ccf72d5892b68b571f51e803970f0ff2501b3781a9406
                                                                      • Opcode Fuzzy Hash: c0ddf77dfa45edd0ac3d30d58e3604f3091a01ec6f74cc96ee3d663dc1c8b33f
                                                                      • Instruction Fuzzy Hash: 0051BD35611205EFEB11EF64DC89BA9BBB9EF08310F1041A9F905AF2E1CB759915CF90
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,2DDDF7D7), ref: 0028AA57
                                                                        • Part of subcall function 00266150: MultiByteToWideChar.KERNEL32(00000003,00000000,002F38A1,000000FF,00000000,00000000,00000000,?,?,002783BC,002F38A1), ref: 00266168
                                                                        • Part of subcall function 00266150: MultiByteToWideChar.KERNEL32(00000003,00000000,002F38A1,000000FF,?,-00000001,?,002783BC,002F38A1), ref: 0026619A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$ObjectSingleWait
                                                                      • String ID: 2Svp1Sv$*.*$.jar$.pack$0!$$@9/$p2Sv3Sv
                                                                      • API String ID: 3339361032-921004472
                                                                      • Opcode ID: 70ce059b3fa835e365c2c0947f1196bcf6f281b8652be82a05448f012c0499fb
                                                                      • Instruction ID: c694f6a36f1cfaa1c8399a181c119c59e3527dcf8153e92474131f4e4a723d6c
                                                                      • Opcode Fuzzy Hash: 70ce059b3fa835e365c2c0947f1196bcf6f281b8652be82a05448f012c0499fb
                                                                      • Instruction Fuzzy Hash: 2D618374A1160A9FDB04DFA8C894BAEBBB5FF48324F14416AE411A73D1DB34AD10CFA5
                                                                      APIs
                                                                      • GetActiveWindow.USER32 ref: 0028EC2D
                                                                      • GetForegroundWindow.USER32 ref: 0028EC39
                                                                      • SetLastError.KERNEL32(0000000E,?,?,?,2DDDF7D7), ref: 0028EC80
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ActiveErrorForegroundLast
                                                                      • String ID: \,1
                                                                      • API String ID: 1822391280-4060636498
                                                                      • Opcode ID: 65b3a9cebcf2f530a83dbe13a71c5a22f7737e75378d42ef837da7ea8ea340c7
                                                                      • Instruction ID: e32cc2cf798fa3a4829956ce53bfbfbe0cea039a3eb5ad17aa651aa5df9791f5
                                                                      • Opcode Fuzzy Hash: 65b3a9cebcf2f530a83dbe13a71c5a22f7737e75378d42ef837da7ea8ea340c7
                                                                      • Instruction Fuzzy Hash: 6F41D371955249DFDB11DFA4DC45BDEBBB8FF15310F10426AE815A7280DB70AA14CBD0
                                                                      APIs
                                                                      • FlushFileBuffers.KERNEL32(?,?,00000000,?,000000FF,?,00291597,?,?,?,00000000), ref: 00291F65
                                                                      • GetFileSize.KERNEL32(?,00000000,?,00000000,?,000000FF,?,00291597), ref: 00291F75
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$BuffersFlushSize
                                                                      • String ID: +F-$?F-$FTP Server$HTTP/1.0$Local Network Server$.
                                                                      • API String ID: 3400284609-3607065384
                                                                      • Opcode ID: 9ace14965499975c26ffedd27f7e9d6209bf3b1d1883048d538bc1cfa05dea70
                                                                      • Instruction ID: d8802d09810e39dabf909762e6a352aefb6d5b78699dd7e7947ce420979e3628
                                                                      • Opcode Fuzzy Hash: 9ace14965499975c26ffedd27f7e9d6209bf3b1d1883048d538bc1cfa05dea70
                                                                      • Instruction Fuzzy Hash: A8415C71A0424A9FCB04CF68C8446AEBBB8FF08320F14426AE925E7391D7759E11CBA0
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 002B4316
                                                                      • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 002B4324
                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 002B4335
                                                                      • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 002B4346
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$HandleModule
                                                                      • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                      • API String ID: 667068680-1247241052
                                                                      • Opcode ID: 6a21268d3cba655bfd40cd5d7958494cda26da22f8af9ae3538e230dcac415bb
                                                                      • Instruction ID: 18b46b0d5585c5d110b13cfe25448ec57b06e3d3ea280412e601f86328c89389
                                                                      • Opcode Fuzzy Hash: 6a21268d3cba655bfd40cd5d7958494cda26da22f8af9ae3538e230dcac415bb
                                                                      • Instruction Fuzzy Hash: 9BE086715D52946FE310DF74FC4E8563EE8EA6A3613000072F608C2150D77004028B50
                                                                      APIs
                                                                      • GetProcessHeap.KERNEL32(002553F4,?,?,000000FF), ref: 00254D7D
                                                                      • HeapFree.KERNEL32(00000000,002553F4,?,?,000000FF), ref: 00254D83
                                                                      • GetProcessHeap.KERNEL32(002552F5,000000FF,?,000000FF), ref: 00254DBD
                                                                      • HeapFree.KERNEL32(00000000,002552F5,000000FF,?,000000FF), ref: 00254DC3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$FreeProcess
                                                                      • String ID: $@/$4@/$D@/$d@/$?/
                                                                      • API String ID: 3859560861-3967436770
                                                                      • Opcode ID: 8e79c5a98311505f5ea9d78ecf5125e6e75b00c236dd49b371b6f94e582f633e
                                                                      • Instruction ID: b319cd01570830caa318e639788c8c77383836be5a3f730c1333f44cfe097dea
                                                                      • Opcode Fuzzy Hash: 8e79c5a98311505f5ea9d78ecf5125e6e75b00c236dd49b371b6f94e582f633e
                                                                      • Instruction Fuzzy Hash: D381D172E112069FEB14DF58C840BAAF7F4FB80329F154629ED059B380D775ED988B94
                                                                      APIs
                                                                      • GetDlgItem.USER32(-0000003C,00000427), ref: 002958D6
                                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 002958E6
                                                                      • EndDialog.USER32(?,00000001), ref: 002958FA
                                                                        • Part of subcall function 00295C00: SetWindowTextW.USER32(00000002,?), ref: 00295C9E
                                                                        • Part of subcall function 00295C00: GetDlgItem.USER32(?,0000042B), ref: 00295D02
                                                                        • Part of subcall function 00295C00: SetWindowTextW.USER32(00000000,?), ref: 00295D0D
                                                                        • Part of subcall function 00295C00: GetDlgItem.USER32(?,00000001), ref: 00295D17
                                                                        • Part of subcall function 00295C00: EnableWindow.USER32(00000000,00000000), ref: 00295D20
                                                                      • EndDialog.USER32(?,00000002), ref: 00295925
                                                                      • GetDlgItem.USER32(?,00000001), ref: 00295974
                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00295986
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ItemWindow$DialogEnableText$MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3408327222-0
                                                                      • Opcode ID: b85ab7765a86e1201398a6cd9b0345cbc742fac50973ce06bf6db98d96f04335
                                                                      • Instruction ID: d57bbf592ede124aa02ff5106c4b43246a86ac8a539e0105637f983092d35c97
                                                                      • Opcode Fuzzy Hash: b85ab7765a86e1201398a6cd9b0345cbc742fac50973ce06bf6db98d96f04335
                                                                      • Instruction Fuzzy Hash: 3351F371B206169FEF159F28EC89B6A77A5FB44320F40416AFD018B280D772DCA4CBE1
                                                                      APIs
                                                                      • IsWindowVisible.USER32 ref: 00270926
                                                                      • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 0027093C
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00270946
                                                                      • GetDlgItem.USER32(?,?), ref: 002709B2
                                                                      • GetWindowRect.USER32(00000000,?), ref: 002709CA
                                                                      • MapWindowPoints.USER32(00000000,?,00000002,00000002), ref: 002709DB
                                                                      • SetWindowPos.USER32(00000014,00000000,?,00000002,00000002,?,00000014,?,00000002,00000002,?,?,?,000000F0,?,00000000), ref: 00270A57
                                                                      • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00270A85
                                                                      • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 00270A96
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$MessageSend$ItemLongPointsRectRedrawVisible
                                                                      • String ID:
                                                                      • API String ID: 3196996609-0
                                                                      • Opcode ID: 205683ec84efbf48132b96740ed1e5cad16c74f201459263959f2f0308d9a673
                                                                      • Instruction ID: 3a725b821ecd2a844e7a26d922eece876e9c2e7abc41ef0dd3c272278e8bd5fd
                                                                      • Opcode Fuzzy Hash: 205683ec84efbf48132b96740ed1e5cad16c74f201459263959f2f0308d9a673
                                                                      • Instruction Fuzzy Hash: 43517E31254301DFE724CF28D889B2ABBE1FF84704F148A1CF9999A2A5D771E854CB41
                                                                      APIs
                                                                      • CoInitializeEx.OLE32(00000000,00000000,2DDDF7D7), ref: 002564FC
                                                                      • GetProcessHeap.KERNEL32(?,00000000), ref: 00256613
                                                                      • HeapFree.KERNEL32(00000000,?,00000000), ref: 00256619
                                                                      • GetProcessHeap.KERNEL32(?,00000000), ref: 002566AA
                                                                      • HeapFree.KERNEL32(00000000,?,00000000), ref: 002566B0
                                                                      • CoUninitialize.OLE32 ref: 0025688A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$FreeProcess$InitializeUninitialize
                                                                      • String ID: 4?/
                                                                      • API String ID: 4239879612-791446331
                                                                      • Opcode ID: bacce77c9a17c5f662871da9f6ed3b6a04bea60402e71f072e55130d4be75949
                                                                      • Instruction ID: bc26c45046fe1409caadb50a80582b8fef4e0fc0b8ec3db895bd046aa7cb8569
                                                                      • Opcode Fuzzy Hash: bacce77c9a17c5f662871da9f6ed3b6a04bea60402e71f072e55130d4be75949
                                                                      • Instruction Fuzzy Hash: E4E19C70D10359CFEF14CFA4C848BADBBB8AF44305F2441A9E805AB291DB74AE59CF64
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,00000080,00000001,Close,50000001,?,00000128,00000025,00000032,0000000E,00000082,000001F5,?,50000000,?,00000026), ref: 00270DC5
                                                                      • DialogBoxIndirectParamW.USER32(00000000,00000000,?,00270F30,00000000), ref: 00270E14
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: DialogHandleIndirectModuleParam
                                                                      • String ID: Close$Copy$Details >>$Send Error Report$d\/
                                                                      • API String ID: 279259766-4165310048
                                                                      • Opcode ID: 998761ce02c3224188805913977f3fa96ce0b24f747647143cad6d2ed0fa0b75
                                                                      • Instruction ID: c3032f4206396b2fc94cd7894e3deb83cc2bfe8229a06843812974cbc9daa783
                                                                      • Opcode Fuzzy Hash: 998761ce02c3224188805913977f3fa96ce0b24f747647143cad6d2ed0fa0b75
                                                                      • Instruction Fuzzy Hash: A6D1AE70A50719EFDB14CFA4CC95BAEB7B5EF48714F108229E515BB2C0D7B0AA15CB90
                                                                      APIs
                                                                      • GetWindowLongW.USER32(00000064,000000F0), ref: 002963B6
                                                                      • IsWindowVisible.USER32(00000064), ref: 00296401
                                                                      • SendMessageW.USER32(00000064,0000000B,00000000,00000000), ref: 00296417
                                                                      • SendMessageW.USER32(00000064,0000000B,00000001,00000000), ref: 0029660E
                                                                      • RedrawWindow.USER32(00000064,00000000,00000000,00000185,?,?), ref: 00296627
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$MessageSend$LongRedrawVisible
                                                                      • String ID: dddd$dddd
                                                                      • API String ID: 554559110-3677277811
                                                                      • Opcode ID: 2970e7d0c69e7d2506aabe29280df83701d3b6b4f6d94a064d0817dc4f6862d5
                                                                      • Instruction ID: cebc4ca3ef744b05676e865345cb7f4e7689242b7d8fe83b8e09b49a5134c3fd
                                                                      • Opcode Fuzzy Hash: 2970e7d0c69e7d2506aabe29280df83701d3b6b4f6d94a064d0817dc4f6862d5
                                                                      • Instruction Fuzzy Hash: D5915671A183519FDB10CF18C884A1ABBF5FF88710F554A2EF995A72A0D771E854CF82
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(Advapi32.dll,2DDDF7D7,?,00000000,?,?,Function_00095000,000000FF,?,0026173D,?), ref: 0026182A
                                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 0026183A
                                                                      • GetModuleHandleW.KERNEL32(Advapi32.dll,2DDDF7D7,?,00000000,?,?,Function_00095000,000000FF,?,0026173D,?), ref: 002618A6
                                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 002618B6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddressHandleModuleProc
                                                                      • String ID: Advapi32.dll$RegDeleteKeyExW$RegDeleteKeyTransactedW
                                                                      • API String ID: 1646373207-1053001802
                                                                      • Opcode ID: 84cc0800f548b7bab81ee8e7793951b884f8b213ba39977bc6267d6d6fd3a0e0
                                                                      • Instruction ID: 3d3b91e588950caf98f70f0464836cca61bd66d93cd38be115bb83cfebe6f040
                                                                      • Opcode Fuzzy Hash: 84cc0800f548b7bab81ee8e7793951b884f8b213ba39977bc6267d6d6fd3a0e0
                                                                      • Instruction Fuzzy Hash: CA310936A58244EFE721CF55EC44B9DFBA9FB58721F14413AE90593390C7B2A8B0DB90
                                                                      APIs
                                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,80000002,80000002,00310A68), ref: 0026FB50
                                                                      • LoadLibraryW.KERNEL32(Shell32.dll,?,80000002,80000002,00310A68), ref: 0026FB63
                                                                      • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 0026FB73
                                                                      • SHGetPathFromIDListW.SHELL32(?,00000000), ref: 0026FC02
                                                                      • SHGetMalloc.SHELL32(?), ref: 0026FC4A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFolderFromLibraryListLoadLocationMallocPathProcSpecial
                                                                      • String ID: SHGetSpecialFolderPathW$Shell32.dll
                                                                      • API String ID: 2352187698-2988203397
                                                                      • Opcode ID: cb950417fb1fc5ae9b736150c31cd89b7a61d1d5ce69e0ad9d7dfa0d0012f0a5
                                                                      • Instruction ID: 5cc99673e020636ab4f72cb455eb907d88ffa6bd6abc8f5c16b9b4ff6ca7db95
                                                                      • Opcode Fuzzy Hash: cb950417fb1fc5ae9b736150c31cd89b7a61d1d5ce69e0ad9d7dfa0d0012f0a5
                                                                      • Instruction Fuzzy Hash: F93138726007069BDF249F24FD59B67B7F5AF84704F08843CE885871D4EBB198D28B92
                                                                      APIs
                                                                      • GetActiveWindow.USER32 ref: 0028DC7B
                                                                      • SetLastError.KERNEL32(0000000E), ref: 0028DC98
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0028DCC7
                                                                      • EnterCriticalSection.KERNEL32(00312C5C), ref: 0028DCE7
                                                                      • LeaveCriticalSection.KERNEL32(00312C5C), ref: 0028DD0B
                                                                      • DialogBoxParamW.USER32(000000D8,00000000,Function_0003BD70,00000000), ref: 0028DD28
                                                                        • Part of subcall function 002B1F2A: GetProcessHeap.KERNEL32(00000008,00000008,?,0027A67E), ref: 002B1F2F
                                                                        • Part of subcall function 002B1F2A: HeapAlloc.KERNEL32(00000000), ref: 002B1F36
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalHeapSection$ActiveAllocCurrentDialogEnterErrorLastLeaveParamProcessThreadWindow
                                                                      • String ID: \,1
                                                                      • API String ID: 828238446-4060636498
                                                                      • Opcode ID: 60114fbc314f294dbcd922307e4f9800da6496f7a6a458d724b995dc39e7d740
                                                                      • Instruction ID: 5eaf74802266116b851cc0f86e6843bddda3a5aa24e252b26dd587d8aa3c4ad1
                                                                      • Opcode Fuzzy Hash: 60114fbc314f294dbcd922307e4f9800da6496f7a6a458d724b995dc39e7d740
                                                                      • Instruction Fuzzy Hash: 4C312535644344EFC7219F64EC48B9EBBB8FB08715F00465AE908AB7C0C7B16814CB91
                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,000000FC,00000000), ref: 0028CEF3
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0028CF08
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0028CF20
                                                                      • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,00000000,80000000,80000000,00000000,00000000,?,00000000,00000000), ref: 0028CF5D
                                                                      • IsWindow.USER32(00000000), ref: 0028CF67
                                                                      • SendMessageW.USER32(?,00000401,00000001,00000000), ref: 0028CF7D
                                                                        • Part of subcall function 002B1F2A: GetProcessHeap.KERNEL32(00000008,00000008,?,0027A67E), ref: 002B1F2F
                                                                        • Part of subcall function 002B1F2A: HeapAlloc.KERNEL32(00000000), ref: 002B1F36
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$Heap$AllocCreateMessageProcessSend
                                                                      • String ID: tooltips_class32
                                                                      • API String ID: 1584627587-1918224756
                                                                      • Opcode ID: 5f472f6a64e6a7a7870242859c6844315cd400767326bba9aed4c29ea3046b59
                                                                      • Instruction ID: 173a5e687e90d4064adc323686a3b1a14f49dbf4eb1d5a9f31ac7f2099ee2319
                                                                      • Opcode Fuzzy Hash: 5f472f6a64e6a7a7870242859c6844315cd400767326bba9aed4c29ea3046b59
                                                                      • Instruction Fuzzy Hash: EF21A375355202BFDB10AF68EC49F26BBA9FB48761F104326F515D76E0DB70A820CBA4
                                                                      APIs
                                                                      • LocalFree.KERNEL32(?,?,?), ref: 002650A2
                                                                      • LocalFree.KERNEL32(?,?,?), ref: 002650B6
                                                                      • GetLastError.KERNEL32 ref: 002650F8
                                                                      • LocalAlloc.KERNEL32(00000040,00000014), ref: 00265138
                                                                      • GetLastError.KERNEL32 ref: 00265152
                                                                      • LocalFree.KERNEL32(?), ref: 00265163
                                                                        • Part of subcall function 00243620: RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Local$Free$ErrorLast$AllocAllocateHeap
                                                                      • String ID: sF-$}F-
                                                                      • API String ID: 1027944315-809066640
                                                                      • Opcode ID: 3f78c74096afdabc0daeaa2e1e36b03d7410d006e8a3290f51883845b04e0672
                                                                      • Instruction ID: 66cc661b71750a012b89fa5bb7991c7d2606781d0f9b9f8b1ee0ff90a70766a5
                                                                      • Opcode Fuzzy Hash: 3f78c74096afdabc0daeaa2e1e36b03d7410d006e8a3290f51883845b04e0672
                                                                      • Instruction Fuzzy Hash: 95313870614B02AFD7308F69EC49B97B7F8BF48704F00892DE88AD6650EB74D558CB61
                                                                      APIs
                                                                      • GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,002B1F72,00000000), ref: 002B1DEC
                                                                      • HeapAlloc.KERNEL32(00000000,?,002B1F72,00000000), ref: 002B1DF3
                                                                        • Part of subcall function 002B1EBE: IsProcessorFeaturePresent.KERNEL32(0000000C,002B1DDA,00000000,?,002B1F72,00000000), ref: 002B1EC0
                                                                      • InterlockedPopEntrySList.KERNEL32(00000000,00000000,?,002B1F72,00000000), ref: 002B1E03
                                                                      • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,002B1F72,00000000), ref: 002B1E2A
                                                                      • RaiseException.KERNEL32(C0000017,00000000,00000000,00000000,?,002B1F72,00000000), ref: 002B1E3E
                                                                      • InterlockedPopEntrySList.KERNEL32(00000000,?,002B1F72,00000000), ref: 002B1E51
                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,002B1F72,00000000), ref: 002B1E64
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AllocEntryHeapInterlockedListVirtual$ExceptionFeatureFreePresentProcessProcessorRaise
                                                                      • String ID:
                                                                      • API String ID: 2460949444-0
                                                                      • Opcode ID: 32f4835bea9d1cb13b71360ed1e3e659322e4b6293549fdce715469da01ec531
                                                                      • Instruction ID: 6861fba507d7e5ac3928fa230563eeeec9df9f13d0604bbb59657bd5eadbf12f
                                                                      • Opcode Fuzzy Hash: 32f4835bea9d1cb13b71360ed1e3e659322e4b6293549fdce715469da01ec531
                                                                      • Instruction Fuzzy Hash: 4911B231695652ABE7321B78BCACFEB766CAB447C1F948130FE01DA150DA60DC314BB0
                                                                      APIs
                                                                      • GetLastError.KERNEL32 ref: 0029027A
                                                                      • ResetEvent.KERNEL32(?,?,?,?,?,?,?,POST,?,?,-00000010), ref: 00290475
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00290495
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 002904A0
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                        • Part of subcall function 00291750: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,2DDDF7D7,?,?,00000000), ref: 0029178F
                                                                        • Part of subcall function 00291750: GetLastError.KERNEL32 ref: 002917B0
                                                                        • Part of subcall function 00291750: CloseHandle.KERNEL32(?), ref: 00291A94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastObjectSingleWait$CloseCreateEventFileHandleHeapProcessReset
                                                                      • String ID: .part$POST
                                                                      • API String ID: 2995559500-3433193937
                                                                      • Opcode ID: 3f0225d3b957383e4841fea039d241022947c2b59ba09e14a25407c399115cb7
                                                                      • Instruction ID: b4559e822e8ce2c54b6f4c0437727c758987d530a7fa7a9fe22669cec67b43d3
                                                                      • Opcode Fuzzy Hash: 3f0225d3b957383e4841fea039d241022947c2b59ba09e14a25407c399115cb7
                                                                      • Instruction Fuzzy Hash: 4C129D31A10249DFDF04DFA8C888BAEBBB8FF48314F144169E915A7391DB74AA15CF91
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,00000000), ref: 002A1E7D
                                                                      • lstrlenW.KERNEL32(?), ref: 002A1E91
                                                                      • CloseHandle.KERNEL32(?), ref: 002A1EE3
                                                                      • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 002A1F11
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$CloseCreateFileHandle
                                                                      • String ID: ?$\
                                                                      • API String ID: 2263087898-1128499142
                                                                      • Opcode ID: 1d499206111ad6d8085e14320ca5468e589bd4133b29260fb91d24a3c2b76fd6
                                                                      • Instruction ID: 5291497d7bae5d5b16da3c884b51d3e5ed558367bcdd2b1f7a3ed0e1bea0dd87
                                                                      • Opcode Fuzzy Hash: 1d499206111ad6d8085e14320ca5468e589bd4133b29260fb91d24a3c2b76fd6
                                                                      • Instruction Fuzzy Hash: E3F18BB0A10618CFCB24DF28C884B99B7F5BF49320F1485ADE55A973A1DB30AE95CF54
                                                                      APIs
                                                                        • Part of subcall function 00261950: CharNextW.USER32(?,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 00261986
                                                                        • Part of subcall function 00261950: CharNextW.USER32(00000000,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 002619AB
                                                                        • Part of subcall function 00261950: CharNextW.USER32(?,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 002619BF
                                                                        • Part of subcall function 00261950: CharNextW.USER32(?,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 002619CB
                                                                      • lstrcmpiW.KERNEL32(?,002F48FC,?,2DDDF7D7,00000000,00000000,?), ref: 002610B1
                                                                      • lstrcmpiW.KERNEL32(?,002F37C4), ref: 002610CC
                                                                      • VarUI4FromStr.OLEAUT32(?,00000000,00000000,?), ref: 00261346
                                                                      • CharNextW.USER32(?,?), ref: 00261439
                                                                      • CharNextW.USER32(00000000), ref: 00261453
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$lstrcmpi$From
                                                                      • String ID:
                                                                      • API String ID: 298784196-0
                                                                      • Opcode ID: df553fe31eef4bc9661ee3dfb4776c093a9a065802506a8c273862d67cbf473a
                                                                      • Instruction ID: af63c123eab444a3cc21ff4ad795598675f45b128eebff02b8900cae31f7b8eb
                                                                      • Opcode Fuzzy Hash: df553fe31eef4bc9661ee3dfb4776c093a9a065802506a8c273862d67cbf473a
                                                                      • Instruction Fuzzy Hash: 43D1D07092024ADFDF24DF64C895BEE77B4EF04300F184169ED5AAB291DB74AAB4CB50
                                                                      APIs
                                                                        • Part of subcall function 00266400: GetFileAttributesW.KERNEL32(?,?,?,002F2E60,00000001,2DDDF7D7,?,?,00000000), ref: 00266681
                                                                        • Part of subcall function 00266400: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00266692
                                                                        • Part of subcall function 00266400: FindNextFileW.KERNEL32(-00000001,?,?,?,00000000), ref: 00266706
                                                                      • GetFileAttributesW.KERNEL32(?,?,?,002F2E60,00000001,2DDDF7D7,?,?,00000000), ref: 002666A5
                                                                      • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 002666B6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$Attributes$FindNext
                                                                      • String ID: p2Sv3Sv
                                                                      • API String ID: 3019667586-3579131148
                                                                      • Opcode ID: c698a4c3157446a8016e2d43bf59c5dfe52a89529eca168114b825f61b1635d8
                                                                      • Instruction ID: 5864158f17de5ec3f99dfa56bac35a4244fb70147293a1674c124eb1db0617be
                                                                      • Opcode Fuzzy Hash: c698a4c3157446a8016e2d43bf59c5dfe52a89529eca168114b825f61b1635d8
                                                                      • Instruction Fuzzy Hash: 7EA1F031A2064AEFDB14DF68DC99BAEB7B8FF00320F144629E815972D1DB749E54CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: HeapProcess
                                                                      • String ID: ?F-
                                                                      • API String ID: 54951025-864735049
                                                                      • Opcode ID: 4be7ec160602fc3b3a3b5b0744dd9a995aba23496eea6678acb1cd7e3b065fd7
                                                                      • Instruction ID: 7e13841d8ee3526b08edf74f8308ad87bba7ee8813f045c8cd7245123b6b9f6c
                                                                      • Opcode Fuzzy Hash: 4be7ec160602fc3b3a3b5b0744dd9a995aba23496eea6678acb1cd7e3b065fd7
                                                                      • Instruction Fuzzy Hash: 6A917931A00249EFCF11CFA8D888B9DBBB5FF48324F148169E915AB391CB749D15CB91
                                                                      APIs
                                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 0028E17F
                                                                      • GetWindowLongW.USER32(?,000000FC), ref: 0028E18E
                                                                      • CallWindowProcW.USER32(?,?,00000082,?,?), ref: 0028E1A9
                                                                      • GetWindowLongW.USER32(?,000000FC), ref: 0028E1C3
                                                                      • SetWindowLongW.USER32(?,000000FC,?), ref: 0028E1D5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$CallProc
                                                                      • String ID: $
                                                                      • API String ID: 513923721-3993045852
                                                                      • Opcode ID: 35ccb9a0f2357e2f049c495e231699b5a90da9956c90a29127ca0dfa4717a826
                                                                      • Instruction ID: e7ab9f052736cd6c1204f988ab90d2ed85b32ec60ba8643e472155f94474168d
                                                                      • Opcode Fuzzy Hash: 35ccb9a0f2357e2f049c495e231699b5a90da9956c90a29127ca0dfa4717a826
                                                                      • Instruction Fuzzy Hash: 0B4159B5608702AFC700DF19D888A1AFBF5FF88320F104A19F959876A0D772E964DF91
                                                                      APIs
                                                                      • EnterCriticalSection.KERNEL32(00312C5C,2DDDF7D7), ref: 0027BDAD
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0027BDC1
                                                                      • LeaveCriticalSection.KERNEL32(00312C5C), ref: 0027BDFF
                                                                      • SetWindowLongW.USER32(?,00000004,00000000), ref: 0027BE65
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$CurrentEnterLeaveLongThreadWindow
                                                                      • String ID: \,1$\,1
                                                                      • API String ID: 3550545212-3073346799
                                                                      • Opcode ID: e03ded86d027ab355491ace57e49bddebf681d0b63e1b6d431b2ba2b56b1bf73
                                                                      • Instruction ID: 2809ab4ac099d30e51a87d829ddc0f3e41db1c73c08bdcd24893fb22e147d900
                                                                      • Opcode Fuzzy Hash: e03ded86d027ab355491ace57e49bddebf681d0b63e1b6d431b2ba2b56b1bf73
                                                                      • Instruction Fuzzy Hash: 1131C631A14755DFC722CF65EC48BABBBB9FB49760F00866AE91997350D7709820CBE0
                                                                      APIs
                                                                      • LoadLibraryW.KERNEL32(Shlwapi.dll,?,00000000,?,?,?,?,?,?,?,?,00272E21,?), ref: 0026F6FF
                                                                      • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 0026F715
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 0026F758
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,00272E21,?), ref: 0026F774
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Free$AddressLoadProc
                                                                      • String ID: DllGetVersion$Shlwapi.dll
                                                                      • API String ID: 1386263645-2240825258
                                                                      • Opcode ID: 497c16d4b2402d0354de1b2b8f5cb609b0084d2d2dec92ae6a770061b62ae748
                                                                      • Instruction ID: 2c4ab2a6fa92e3b0f1c545b75cc8bf5c44c12da8b7f06fcc9adffb7f476e6c4a
                                                                      • Opcode Fuzzy Hash: 497c16d4b2402d0354de1b2b8f5cb609b0084d2d2dec92ae6a770061b62ae748
                                                                      • Instruction Fuzzy Hash: F521BD766543058BD710DF29E88556BFBE4EFDD361F40092EF859C7200EA31D4898B92
                                                                      APIs
                                                                      • ResetEvent.KERNEL32(?), ref: 002AD30D
                                                                      • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 002AD31D
                                                                      • GetLastError.KERNEL32 ref: 002AD32D
                                                                      • CloseHandle.KERNEL32(?), ref: 002AD357
                                                                      • GetLastError.KERNEL32 ref: 002AD361
                                                                      • CreateSemaphoreW.KERNEL32(00000000,00000000,00000003,00000000), ref: 002AD386
                                                                      • GetLastError.KERNEL32 ref: 002AD393
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CreateEvent$CloseHandleResetSemaphore
                                                                      • String ID:
                                                                      • API String ID: 3310109588-0
                                                                      • Opcode ID: 55eba4c2d2d319d5c99b88f63d2a10cc2e9742190c00c7b3ab749f7a0586a4d1
                                                                      • Instruction ID: 81cc497f8b0d3059ff4fedc9aba61d89f3d4ba0c1c8338a9ead3c450df0293bf
                                                                      • Opcode Fuzzy Hash: 55eba4c2d2d319d5c99b88f63d2a10cc2e9742190c00c7b3ab749f7a0586a4d1
                                                                      • Instruction Fuzzy Hash: 15219A70354742DBEF308F25DC9872A73E8AF41741F1048A8E947CAA90EBB0E8448F62
                                                                      APIs
                                                                      • ResetEvent.KERNEL32(?,?,?,00000000,00292C42,?,?,?,?,?,00000003,00000000,2DDDF7D7,?,?), ref: 00293A33
                                                                      • GetLastError.KERNEL32(?,?,?,00000000,00292C42,?,?,?,?,?,00000003,00000000,2DDDF7D7,?,?), ref: 00293A60
                                                                      • WaitForSingleObject.KERNEL32(?,0000000A,?,?,?,00000000,00292C42,?,?,?,?,?,00000003,00000000,2DDDF7D7), ref: 00293A9A
                                                                      • SetEvent.KERNEL32(?,?,?,?,00000000,00292C42,?,?,?,?,?,00000003,00000000,2DDDF7D7,?,?), ref: 00293AC3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Event$ErrorLastObjectResetSingleWait
                                                                      • String ID: !F-$B,)
                                                                      • API String ID: 708712559-859536791
                                                                      • Opcode ID: d2d74b13fc40ec2be3999465233a103d7eadbe23ee6142d341d085bc717df9b4
                                                                      • Instruction ID: 4c3dd6c60ca5777fb7767a80139f21ba999ab930ce18963a85850c71b7e7dc93
                                                                      • Opcode Fuzzy Hash: d2d74b13fc40ec2be3999465233a103d7eadbe23ee6142d341d085bc717df9b4
                                                                      • Instruction Fuzzy Hash: 3411D3322147419FDF30CF55E88CB567BA5EB95321F04882EE0C3865A1C730E9A4D720
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,002B16C3,002B1622,002B1944), ref: 002B165F
                                                                      • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 002B1675
                                                                      • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 002B168A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$HandleModule
                                                                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                      • API String ID: 667068680-1718035505
                                                                      • Opcode ID: c66ae2d041b97ef4fa4e3650f7c6e27944a58ed3d19373d8b8ca65550ef33fe5
                                                                      • Instruction ID: a94da1b1f011bd061da03642aaee8dc30ed452acd1472fb1610ffaa0e302aafb
                                                                      • Opcode Fuzzy Hash: c66ae2d041b97ef4fa4e3650f7c6e27944a58ed3d19373d8b8ca65550ef33fe5
                                                                      • Instruction Fuzzy Hash: 71F028713716638B8B320F705DB95E723DC9A02BD4388023AE505C7640D650CCB186C1
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,0000040A), ref: 002843A3
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 002843AE
                                                                      • GetDlgItem.USER32(?,0000040B), ref: 002843BC
                                                                      • SendMessageW.USER32(00000000,00000410,00000002,00000000), ref: 002843CE
                                                                      • ShowWindow.USER32(00000000,00000000), ref: 002843D7
                                                                      • Sleep.KERNEL32(000000C8), ref: 002843E2
                                                                      • ShowWindow.USER32(00000000,00000001), ref: 002843EB
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ItemShow$MessageSendSleepText
                                                                      • String ID:
                                                                      • API String ID: 106862907-0
                                                                      • Opcode ID: 8e23c03420bfa33a83bc17d27ac9119a203d6262b9110c82011e4e61407f21fd
                                                                      • Instruction ID: 960338cd3cb47bf51cb8772cfb2827989bd745e8d3d27af462996ce5ca35e199
                                                                      • Opcode Fuzzy Hash: 8e23c03420bfa33a83bc17d27ac9119a203d6262b9110c82011e4e61407f21fd
                                                                      • Instruction Fuzzy Hash: 77017C32284311BFEB506B60EC4DF8A7BA4BF48B11F044454FB01AB1E0C7B058219B54
                                                                      APIs
                                                                        • Part of subcall function 00267C78: ShellExecuteExW.SHELL32(0000003C), ref: 00267D54
                                                                        • Part of subcall function 00267C78: GetLastError.KERNEL32 ref: 00267D65
                                                                      • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 00277BA3
                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00277BD5
                                                                      • CloseHandle.KERNEL32(?), ref: 00277C8A
                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00277CD1
                                                                      • CloseHandle.KERNEL32(?,?,002F2ECC), ref: 00277D36
                                                                      • CloseHandle.KERNEL32(?), ref: 00277D6C
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CloseFileHandle$CreateErrorExecuteLastReadShellWrite
                                                                      • String ID:
                                                                      • API String ID: 521638843-0
                                                                      • Opcode ID: d8ac6c18978d221c4aa4d86592316f8356b50fffac6c059c650b98b59d8a1c11
                                                                      • Instruction ID: eca98a4a3abe5a079fe4a8e89175c7e88834f0bbf10c29a14408b46ff2be3867
                                                                      • Opcode Fuzzy Hash: d8ac6c18978d221c4aa4d86592316f8356b50fffac6c059c650b98b59d8a1c11
                                                                      • Instruction Fuzzy Hash: 0091AE70A142069BDB15CFA8D884BADB7B5FF48310F24816DE819EB291DB70AD51CF60
                                                                      APIs
                                                                      • CharNextW.USER32(?,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 00261986
                                                                      • CharNextW.USER32(00000000,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 002619AB
                                                                      • CharNextW.USER32(?,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 002619BF
                                                                      • CharNextW.USER32(?,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 002619CB
                                                                      • CharNextW.USER32(?,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 00261A31
                                                                      • CharNextW.USER32(?,?,00000000,0000007B,?,?,0026262C,00000000,?,00000000,?,00000000,00000000,00000000,002628BE,?), ref: 00261A5E
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext
                                                                      • String ID:
                                                                      • API String ID: 3213498283-0
                                                                      • Opcode ID: ecedc33f35fd9f22eaca1c1873c14ed083e021ac638bd3ab80869f78f1185e3c
                                                                      • Instruction ID: f0595d00b5ab31636db2c5ec1d092abfdd1b0031fbd810b72e3be8ff6a01f4a2
                                                                      • Opcode Fuzzy Hash: ecedc33f35fd9f22eaca1c1873c14ed083e021ac638bd3ab80869f78f1185e3c
                                                                      • Instruction Fuzzy Hash: 404117362112529FCB20CF78DC885BA77E7FFD8315B59852AF8468B254E731ADA0C750
                                                                      APIs
                                                                      • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00267B3F
                                                                      • GetLastError.KERNEL32 ref: 00267B50
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00267B66
                                                                      • GetExitCodeProcess.KERNEL32(?,000000FF), ref: 00267B77
                                                                      • CloseHandle.KERNEL32(?), ref: 00267B81
                                                                      • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 00267B9C
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ProcessWow64$CloseCodeCreateErrorExitHandleLastObjectRedirectionRevertSingleWait
                                                                      • String ID:
                                                                      • API String ID: 3742689608-0
                                                                      • Opcode ID: 81bb9be90a8670a1763850c6642c6e2a13350f68461e1d6fda3abd2fe08d865e
                                                                      • Instruction ID: 77e23aa74e18d8a159a5d55d6d9459906fac1bdcf49d2a6bd6313c5ad545df5d
                                                                      • Opcode Fuzzy Hash: 81bb9be90a8670a1763850c6642c6e2a13350f68461e1d6fda3abd2fe08d865e
                                                                      • Instruction Fuzzy Hash: B5418F71E18389DBDB10CFA5DD48BAEBBB8FF49714F108259E820A7290D7709940CF90
                                                                      APIs
                                                                      • SymGetLineFromAddr.IMAGEHLP(?,?,?,?,2DDDF7D7), ref: 0026C85E
                                                                        • Part of subcall function 0026C210: LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 0026C26E
                                                                        • Part of subcall function 0026C210: GetProcAddress.KERNEL32(00000000), ref: 0026C275
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddrAddressFromLibraryLineLoadProc
                                                                      • String ID: -> $%hs()$%hs:%ld$[0x%.8Ix]
                                                                      • API String ID: 2196328783-3499247214
                                                                      • Opcode ID: f0852463d2a5f80e6415ec8e3fce6a19aa91744116ddc4b2cc80dd39c95bad7e
                                                                      • Instruction ID: 81017234f44896d979ab0b30fc971b0df3610c6e21db2f8ee611acabff2af7ca
                                                                      • Opcode Fuzzy Hash: f0852463d2a5f80e6415ec8e3fce6a19aa91744116ddc4b2cc80dd39c95bad7e
                                                                      • Instruction Fuzzy Hash: 46E17A70D202699ADB28DF64CC98BEDBBB4FF44304F2042DAE518A7291D7795AD4CF90
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,?), ref: 00295E2D
                                                                      • GetWindowTextLengthW.USER32(00000000), ref: 00295E38
                                                                      • GetWindowTextW.USER32(?,?,?), ref: 00295E91
                                                                      • MessageBeep.USER32(000000FF), ref: 00295ED6
                                                                      • GetDlgItem.USER32(?,?), ref: 00295EEB
                                                                      • SetFocus.USER32(00000000,?,?), ref: 00295EF2
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ItemTextWindow$BeepFocusLengthMessage
                                                                      • String ID:
                                                                      • API String ID: 2221317226-0
                                                                      • Opcode ID: ef1cfc69369e833f61b671ac33ce765713d0bda1e9813f993ab925579ada9b54
                                                                      • Instruction ID: 9ec1bd13efa4468d0fcf7741200cf02ea33971c46303266c5c6df0b94f29ec5b
                                                                      • Opcode Fuzzy Hash: ef1cfc69369e833f61b671ac33ce765713d0bda1e9813f993ab925579ada9b54
                                                                      • Instruction Fuzzy Hash: 5D31D431615616DFCF09DF28D88D86EBBA5FF44321B14466DF855CB2A0DB32A924CF90
                                                                      APIs
                                                                      • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,00000100,?,80000000), ref: 0028E2F3
                                                                      • VerSetConditionMask.KERNEL32(00000000), ref: 0028E2FB
                                                                      • VerSetConditionMask.KERNEL32(00000000), ref: 0028E303
                                                                      • VerifyVersionInfoW.KERNEL32(?), ref: 0028E32C
                                                                      • GetParent.USER32(0028CF9A), ref: 0028E349
                                                                      • SendMessageW.USER32(?,00000432,00000000,00000023), ref: 0028E382
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ConditionMask$InfoMessageParentSendVerifyVersion
                                                                      • String ID:
                                                                      • API String ID: 2374517313-0
                                                                      • Opcode ID: d1a93cca1ffb14fdbc98feb648db43f6189c5fcc1b86291dbe0257ceca59d786
                                                                      • Instruction ID: 003648f1b016cd741b7c49f90e081d03ab8571e8836a2e4e9359484f961d2f8b
                                                                      • Opcode Fuzzy Hash: d1a93cca1ffb14fdbc98feb648db43f6189c5fcc1b86291dbe0257ceca59d786
                                                                      • Instruction Fuzzy Hash: D0314FB1558344AFE3209F64DC4AB9BBBE8EBC9704F00891EF688DA290D7B495448F56
                                                                      APIs
                                                                        • Part of subcall function 002AF400: WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 002AF45E
                                                                        • Part of subcall function 002AF400: GetLastError.KERNEL32 ref: 002AF469
                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,002B0A9E,?), ref: 002B069A
                                                                      • GetLastError.KERNEL32(?,?,002B0A9E,?), ref: 002B06A4
                                                                      • SetEvent.KERNEL32(?,?,?,002B0A9E,?), ref: 002B06B0
                                                                      • GetLastError.KERNEL32(?,?,002B0A9E,?), ref: 002B06BA
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,002B0A9E,?), ref: 002B06D8
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,002B0A9E,?), ref: 002B06F4
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CriticalEventSection$EnterLeaveObjectSingleWait
                                                                      • String ID:
                                                                      • API String ID: 3090723020-0
                                                                      • Opcode ID: e28e6d77283e241195b67de162845ef61aef4ff1421f36fe3da7e09178574067
                                                                      • Instruction ID: e34ed4bf2aa6d90c066ae989410cbde5a94baccf843b19c29408c6535b1061b6
                                                                      • Opcode Fuzzy Hash: e28e6d77283e241195b67de162845ef61aef4ff1421f36fe3da7e09178574067
                                                                      • Instruction Fuzzy Hash: F0218171610705DBD721DFAAE88979BB7E8FF88750F00491EE55ACB211D730A8208F60
                                                                      APIs
                                                                      • ResetEvent.KERNEL32(?,?,002B0A50), ref: 002AF1EB
                                                                      • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,002B0A50), ref: 002AF1FB
                                                                      • GetLastError.KERNEL32 ref: 002AF20C
                                                                      • ResetEvent.KERNEL32(?), ref: 002AF228
                                                                      • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 002AF238
                                                                      • GetLastError.KERNEL32 ref: 002AF249
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Event$CreateErrorLastReset
                                                                      • String ID:
                                                                      • API String ID: 3053278375-0
                                                                      • Opcode ID: c72d83b0a063640f708725334fbab8c1236ee691386270c5781a2267075c85a1
                                                                      • Instruction ID: 8e02b273999a1981fa04c31e5fd10c66abe7c5f0aeee23a0010969c505c65689
                                                                      • Opcode Fuzzy Hash: c72d83b0a063640f708725334fbab8c1236ee691386270c5781a2267075c85a1
                                                                      • Instruction Fuzzy Hash: E3012C343A83439BEBA85FB5BD69B6632D4AB41B02F10413DBD07D96C0EEA8EC504A14
                                                                      APIs
                                                                      • GetActiveWindow.USER32 ref: 0027EE88
                                                                      • GetForegroundWindow.USER32(?,?,?,002DFB6D,000000FF), ref: 0027EE98
                                                                      • SetForegroundWindow.USER32(00000000), ref: 0027EED2
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • OutputDebugStringW.KERNEL32(?,2DDDF7D7,00000000,?,?,?,?,?,002DFB6D,000000FF,?,0028B890,?,?,?,?), ref: 0027EF3B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Foreground$ActiveDebugHeapOutputProcessString
                                                                      • String ID: h1
                                                                      • API String ID: 799693181-313830202
                                                                      • Opcode ID: 9fbf79cecf34fcaff60ac0c9874b3479006ad2fe7c1562811c9497621957cb00
                                                                      • Instruction ID: b4b98c4bb59ec7effdab82ac71351815a62f847fa439ad93080229723304b697
                                                                      • Opcode Fuzzy Hash: 9fbf79cecf34fcaff60ac0c9874b3479006ad2fe7c1562811c9497621957cb00
                                                                      • Instruction Fuzzy Hash: B1710575A002468FDB14DF68D8457AEBBB5FF48320F1981ADE819A7390DB34AD01CFA1
                                                                      APIs
                                                                      • InitializeCriticalSection.KERNEL32(?,2DDDF7D7), ref: 0026A57C
                                                                      • EnterCriticalSection.KERNEL32(?,2DDDF7D7), ref: 0026A589
                                                                      • OutputDebugStringW.KERNEL32(?,?,00000000), ref: 0026A655
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,002DBE7D,000000FF), ref: 0026A718
                                                                        • Part of subcall function 00243620: RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      Strings
                                                                      • Logger::SetLogFile( %s ) while OLD path is:%s, xrefs: 0026A5D0
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$AllocateDebugEnterHeapInitializeLeaveOutputString
                                                                      • String ID: Logger::SetLogFile( %s ) while OLD path is:%s
                                                                      • API String ID: 117955849-1927537607
                                                                      • Opcode ID: 6f389aec7df81f82ce9f1235d28bf532fb0f19f5b815bfbf494b6ac79067233e
                                                                      • Instruction ID: 1aff9014820dddebe65088deb00530c093f262db2c292615dbd68b27012e8c04
                                                                      • Opcode Fuzzy Hash: 6f389aec7df81f82ce9f1235d28bf532fb0f19f5b815bfbf494b6ac79067233e
                                                                      • Instruction Fuzzy Hash: C3611135910256CFCF05DF68C8446AEBBB9FF18320F194199E816AB391DB31AE51CFA1
                                                                      APIs
                                                                      • PathIsUNCW.SHLWAPI(?,2DDDF7D7,?,?,00000000,?,?,?,?,?,?,?,?,00000000,002DB56F,000000FF), ref: 0026720B
                                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,?,002F37AC,00000001,?,2DDDF7D7), ref: 002672CA
                                                                      • GetLastError.KERNEL32(?,2DDDF7D7), ref: 002672D8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectoryErrorLastPath
                                                                      • String ID: \\?\$\\?\UNC\
                                                                      • API String ID: 953296794-3019864461
                                                                      • Opcode ID: 7989e5ee3f4c5b958fbff4007586c30ced0b4210c1bebb820377543ddecc36d7
                                                                      • Instruction ID: 11a700a8dee41c9285e53619c2e8217b3c5170544bb748cf22d2f9a5907294d5
                                                                      • Opcode Fuzzy Hash: 7989e5ee3f4c5b958fbff4007586c30ced0b4210c1bebb820377543ddecc36d7
                                                                      • Instruction Fuzzy Hash: D161AB30A14209CFDB04DFA8D899BADB7F4FF08314F1485A9E811A7391EB359965CFA0
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$DeleteDirectoryFileRemove
                                                                      • String ID: H
                                                                      • API String ID: 50330452-2852464175
                                                                      • Opcode ID: 386dbbdb75a6bc3601660bb621f2ec58fca22495773cc83132fe8f5850a5cf9d
                                                                      • Instruction ID: 599776b79603aac01acfe04673c8e11eee81c3911b488384568ecd21ae919560
                                                                      • Opcode Fuzzy Hash: 386dbbdb75a6bc3601660bb621f2ec58fca22495773cc83132fe8f5850a5cf9d
                                                                      • Instruction Fuzzy Hash: AA519D31910619CBDF10CFA4C988BEEBBB4FB11304F15C4A8E909AB251DB74A958CFA1
                                                                      APIs
                                                                      • EnterCriticalSection.KERNEL32(00310A1C,2DDDF7D7), ref: 0025F82F
                                                                      • DestroyWindow.USER32(00000000), ref: 0025F84D
                                                                      • LeaveCriticalSection.KERNEL32(00310A1C), ref: 0025F896
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$DestroyEnterLeaveWindow
                                                                      • String ID: ,1$,1
                                                                      • API String ID: 1456685395-496849307
                                                                      • Opcode ID: dbd06ed7839bec9b22d1ebef2b11df70b88bb7597898a2a39219ca27493b459c
                                                                      • Instruction ID: c37e186f0dad085d9e5b69ed3a5da844e2a32634d6bb1988498e0f0701ba1e95
                                                                      • Opcode Fuzzy Hash: dbd06ed7839bec9b22d1ebef2b11df70b88bb7597898a2a39219ca27493b459c
                                                                      • Instruction Fuzzy Hash: BA410071A117129BDB209F28ED08B5ABBF8FF04711F144529EC55AB790E7B0AC58CB91
                                                                      APIs
                                                                      • LoadLibraryW.KERNEL32(combase.dll,RoOriginateLanguageException), ref: 00255484
                                                                      • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 0025548A
                                                                      • GetErrorInfo.OLEAUT32(00000000,00000000), ref: 002554DA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddressErrorInfoLibraryLoadProc
                                                                      • String ID: RoOriginateLanguageException$combase.dll
                                                                      • API String ID: 1186719886-3996158991
                                                                      • Opcode ID: 55b22eedc134616404b1515b5f23942fc0f388f7c954f8bae2035082a6c8f615
                                                                      • Instruction ID: c98642522951c64aa94a5222187439a735b06f613b2c028c76e059d9a56f6fde
                                                                      • Opcode Fuzzy Hash: 55b22eedc134616404b1515b5f23942fc0f388f7c954f8bae2035082a6c8f615
                                                                      • Instruction Fuzzy Hash: ED31CF31D2462ADBCB20DF94D855BEEBBB4EF00325F10022AE815A72D0D7B45E98CBD0
                                                                      APIs
                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,2DDDF7D7,00000000,?,00000001,002E6170,000000FF,?,002C41C6,?,?,002C419D,?,?), ref: 002C4206
                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 002C4218
                                                                      • FreeLibrary.KERNEL32(00000000,?,00000001,002E6170,000000FF,?,002C41C6,?,?,002C419D,?,?), ref: 002C423A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: ced16a90c731970d18a3e027478fe32ad8f85294fb3b4e2ef747a435a81c59dc
                                                                      • Instruction ID: 4b90ae9ec9ba975fa6f139c6bf83ac5f8ee2ac301ae96c6b64a96f138b3c231f
                                                                      • Opcode Fuzzy Hash: ced16a90c731970d18a3e027478fe32ad8f85294fb3b4e2ef747a435a81c59dc
                                                                      • Instruction Fuzzy Hash: 8801D671994699EFDB019F91EC49FAFBBBCFB04B14F000629F815A62D0DB749900CA90
                                                                      APIs
                                                                        • Part of subcall function 002B46AF: AcquireSRWLockExclusive.KERNEL32(0030FFB8,?,?,?,00243A56,00310848,2DDDF7D7,?,?,002D516D,000000FF,?,002810B6,2DDDF7D7,?), ref: 002B46BA
                                                                        • Part of subcall function 002B46AF: ReleaseSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243A56,00310848,2DDDF7D7,?,?,002D516D,000000FF,?,002810B6,2DDDF7D7,?), ref: 002B46F4
                                                                      • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 0026C26E
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0026C275
                                                                        • Part of subcall function 002B465E: AcquireSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243AC7,00310848,002E6460), ref: 002B4668
                                                                        • Part of subcall function 002B465E: ReleaseSRWLockExclusive.KERNEL32(0030FFB8,?,?,00243AC7,00310848,002E6460), ref: 002B469B
                                                                        • Part of subcall function 002B465E: WakeAllConditionVariable.KERNEL32(0030FFB4,?,?,00243AC7,00310848,002E6460), ref: 002B46A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ExclusiveLock$AcquireRelease$AddressConditionLibraryLoadProcVariableWake
                                                                      • String ID: Dbghelp.dll$SymFromAddr$7/
                                                                      • API String ID: 1702099962-1580748015
                                                                      • Opcode ID: d938f5d15054d44603899d7932cae2a6950ac8a99470cdee1b5272ec2f6b1ccf
                                                                      • Instruction ID: 2eea75db9590bdc6980b3897bded3aee6d800fb1d7cca8c4fb708d545018d5f2
                                                                      • Opcode Fuzzy Hash: d938f5d15054d44603899d7932cae2a6950ac8a99470cdee1b5272ec2f6b1ccf
                                                                      • Instruction Fuzzy Hash: 0A01D471944645DFC715DF98ED49B9E73A8F709720F108665EE25833D0DB346920CF51
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,002C7144,00000000,?,?,?,?,002C7268,0000001A,AppPolicyGetProcessTerminationMethod,002ED708,AppPolicyGetProcessTerminationMethod,00000000), ref: 002C71E9
                                                                      • GetLastError.KERNEL32(?,002C7144,00000000,?,?,?,?,002C7268,0000001A,AppPolicyGetProcessTerminationMethod,002ED708,AppPolicyGetProcessTerminationMethod,00000000,?,002C986F,00000000), ref: 002C71F3
                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,?,?,?), ref: 002C7231
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$ErrorLast
                                                                      • String ID: api-ms-$ext-ms-
                                                                      • API String ID: 3177248105-537541572
                                                                      • Opcode ID: 7b6ced2ddd9db81a9c7d51d6db51f274779eca737ea01abf7e62479376143f65
                                                                      • Instruction ID: e05a3683f1b98316121e1def374232df948d0b4b298c42d33369523c2e6d0513
                                                                      • Opcode Fuzzy Hash: 7b6ced2ddd9db81a9c7d51d6db51f274779eca737ea01abf7e62479376143f65
                                                                      • Instruction Fuzzy Hash: 64F0A0316D8246B7EB201F22EC0AF593E5CAB11B99F104024FE4CA80E1EB72D97199C2
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a7bb452387f0a2dd81a4d08565ad1db8a5b7f63cee80f24916695dd94ca5b967
                                                                      • Instruction ID: cbfc1c2394163e412288048838a6ae28ac8c097d2bdedb20cef61ede99caa2db
                                                                      • Opcode Fuzzy Hash: a7bb452387f0a2dd81a4d08565ad1db8a5b7f63cee80f24916695dd94ca5b967
                                                                      • Instruction Fuzzy Hash: 8CB12770A2424ADFDB12DF99C880BBD7BB5AF69304F14415BE500AB392C7B09DA5CF61
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • SetWindowTextW.USER32(00000002,?), ref: 00295C9E
                                                                      • GetDlgItem.USER32(?,0000042B), ref: 00295D02
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00295D0D
                                                                      • GetDlgItem.USER32(?,00000001), ref: 00295D17
                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00295D20
                                                                        • Part of subcall function 0027BEA0: GetWindowLongW.USER32(?,000000F0), ref: 0027BEE7
                                                                        • Part of subcall function 0027BEA0: GetParent.USER32(00000000), ref: 0027BEFA
                                                                        • Part of subcall function 0027BEA0: GetWindowRect.USER32(?,80004055), ref: 0027BF13
                                                                        • Part of subcall function 0027BEA0: GetWindowLongW.USER32(00000000,000000F0), ref: 0027BF26
                                                                        • Part of subcall function 0027BEA0: MonitorFromWindow.USER32(?,00000002), ref: 0027BF3E
                                                                        • Part of subcall function 0027BEA0: GetMonitorInfoW.USER32(00000000,8000402D), ref: 0027BF54
                                                                        • Part of subcall function 00295F10: GetWindowLongW.USER32(?,000000F0), ref: 00295F3D
                                                                        • Part of subcall function 00295F10: GetWindowLongW.USER32(?,000000F0), ref: 00295F52
                                                                        • Part of subcall function 00295F10: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00295F69
                                                                        • Part of subcall function 00295F10: GetWindowLongW.USER32(?,000000EC), ref: 00295F82
                                                                        • Part of subcall function 00295F10: SetWindowLongW.USER32(?,000000EC,00000000), ref: 00295F96
                                                                        • Part of subcall function 00295F10: SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 00295FA4
                                                                        • Part of subcall function 00295F10: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00295FB7
                                                                        • Part of subcall function 00295F10: GetDlgItem.USER32(?,0000E801), ref: 00295FC4
                                                                        • Part of subcall function 00295F10: IsWindow.USER32(00000000), ref: 00295FCD
                                                                        • Part of subcall function 00295F10: DestroyWindow.USER32(00000000,?,00000000), ref: 00295FE9
                                                                        • Part of subcall function 00295F10: GetClientRect.USER32(?,800040FD), ref: 00296041
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$Item$MessageMonitorRectSendText$ClientDestroyEnableFromHeapInfoParentProcess
                                                                      • String ID:
                                                                      • API String ID: 3895391425-0
                                                                      • Opcode ID: 8fc5562fa9070970f9f7ca19670e556557d64efadb472eb9d65b1172ed8908c2
                                                                      • Instruction ID: c17b575ccb9eb27f6245ef8eeaa53f2e4593caadc0e1e8980f0f65364f5492f5
                                                                      • Opcode Fuzzy Hash: 8fc5562fa9070970f9f7ca19670e556557d64efadb472eb9d65b1172ed8908c2
                                                                      • Instruction Fuzzy Hash: E361B031A00655DFDB01DFA8DC88AAEBBB4FF09320F144169E915AB3A1DB349D15CFA1
                                                                      APIs
                                                                      • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,2DDDF7D7,00000000,?,?,?,?,?,?,?,00000000,002E20FD,000000FF), ref: 0028BC8D
                                                                      • CreateThread.KERNEL32(00000000,00000000,0028C060,?,00000000,?), ref: 0028BCDD
                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0028BE07
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Create$EventObjectSingleThreadWait
                                                                      • String ID:
                                                                      • API String ID: 1077646455-0
                                                                      • Opcode ID: d74adba1099abde51b0195ce9311e64aa6a98105047c4a2ab9cc2fc3bb5e0f65
                                                                      • Instruction ID: 9ac03c3280b362e0248b7d8e00dec4879639a2372ccd6066d28d75102f395a28
                                                                      • Opcode Fuzzy Hash: d74adba1099abde51b0195ce9311e64aa6a98105047c4a2ab9cc2fc3bb5e0f65
                                                                      • Instruction Fuzzy Hash: 59618A79A11219DFCB05DF58D884BAEBBB5FF88710F248159E915AB390DB30AC51CFA0
                                                                      APIs
                                                                      • GetCurrentThreadId.KERNEL32 ref: 002B417E
                                                                      • AcquireSRWLockExclusive.KERNEL32(0024FCB8,?,00000000,002E6214,000000FF,?,0024FCB8), ref: 002B419D
                                                                      • AcquireSRWLockExclusive.KERNEL32(0024FCB8,?,?,?,00000000,002E6214,000000FF,?,0024FCB8), ref: 002B41CB
                                                                      • TryAcquireSRWLockExclusive.KERNEL32(0024FCB8,?,?,?,00000000,002E6214,000000FF,?,0024FCB8), ref: 002B4226
                                                                      • TryAcquireSRWLockExclusive.KERNEL32(0024FCB8,?,?,?,00000000,002E6214,000000FF,?,0024FCB8), ref: 002B423D
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AcquireExclusiveLock$CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 66001078-0
                                                                      • Opcode ID: 153b736a4701cca584b4078dcdc506bb76ec9da199ca2a803ed2b556733ba399
                                                                      • Instruction ID: c646386c207921a9716af4bd0bbb580feec2c2c466442ff740126b1e74344a42
                                                                      • Opcode Fuzzy Hash: 153b736a4701cca584b4078dcdc506bb76ec9da199ca2a803ed2b556733ba399
                                                                      • Instruction Fuzzy Hash: C9414A34920706DBCF20EF64D4C49EAB3F8FF44390B60492AE95A87542D730F9A5DB50
                                                                      APIs
                                                                        • Part of subcall function 0026F270: SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,2DDDF7D7,00000000,00000000,?), ref: 0026F2CB
                                                                      • GetFileVersionInfoSizeW.VERSION(?,00000000,?,2DDDF7D7,00000000,?,?,?,?,00000000,002DCC55,000000FF,00000000,0026F786,?), ref: 0026F81D
                                                                      • GetFileVersionInfoW.VERSION(?,00000000,002DCC55,00000000,00000000,?,?,00000000,002DCC55,000000FF,00000000,0026F786,?), ref: 0026F849
                                                                      • VerQueryValueW.VERSION(00000000,002F37AC,000000FF,?,?,?,00000000,002DCC55,000000FF,00000000,0026F786,?), ref: 0026F861
                                                                      • GetLastError.KERNEL32(?,?,00000000,002DCC55,000000FF,00000000,0026F786,?), ref: 0026F88E
                                                                      • DeleteFileW.KERNEL32(?), ref: 0026F8A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$InfoVersion$DeleteErrorFolderLastPathQuerySizeValue
                                                                      • String ID:
                                                                      • API String ID: 1753006064-0
                                                                      • Opcode ID: 766000f3dd75e9aae5e9c8874c1e78fb72de8c43757025e48d49572772f67972
                                                                      • Instruction ID: 083d711076fa1fb75dcba40a108164446f7b44a96544455bf16c1e3c0c3db750
                                                                      • Opcode Fuzzy Hash: 766000f3dd75e9aae5e9c8874c1e78fb72de8c43757025e48d49572772f67972
                                                                      • Instruction Fuzzy Hash: BA31B271D1024AEBDF14DFA5ED84BEFBBB8EF09350F1401AAE805A3240D7309954CBA0
                                                                      APIs
                                                                        • Part of subcall function 002B0B70: SetEvent.KERNEL32(00000002,?,002AA8BE,2DDDF7D7), ref: 002B0B7F
                                                                        • Part of subcall function 002B0B70: GetLastError.KERNEL32(?,002AA8BE,2DDDF7D7), ref: 002B0B89
                                                                        • Part of subcall function 002B0B70: WaitForSingleObject.KERNEL32(?,000000FF,?,002AA8BE,2DDDF7D7), ref: 002B0B99
                                                                        • Part of subcall function 002B0B70: GetLastError.KERNEL32(?,002AA8BE,2DDDF7D7), ref: 002B0BA4
                                                                        • Part of subcall function 002B0B70: CloseHandle.KERNEL32(?,?,002AA8BE,2DDDF7D7), ref: 002B0BB2
                                                                      • CloseHandle.KERNEL32(?,2DDDF7D7), ref: 002AA8CA
                                                                      • GetLastError.KERNEL32 ref: 002AA8D4
                                                                      • CloseHandle.KERNEL32(?,2DDDF7D7), ref: 002AA8F8
                                                                      • GetLastError.KERNEL32 ref: 002AA902
                                                                      • CloseHandle.KERNEL32(?,2DDDF7D7), ref: 002AA92B
                                                                      • GetLastError.KERNEL32 ref: 002AA935
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CloseHandle$EventObjectSingleWait
                                                                      • String ID:
                                                                      • API String ID: 2212007442-0
                                                                      • Opcode ID: c37d9f511b893d0b6edbddd1f7e9de9c6df8f59365e8df7f0417441eca7f45ea
                                                                      • Instruction ID: e14613e4f62d0a17c72ced08c0c7dd1c88bdee2b9fd723eca1c3f64d77f9ad81
                                                                      • Opcode Fuzzy Hash: c37d9f511b893d0b6edbddd1f7e9de9c6df8f59365e8df7f0417441eca7f45ea
                                                                      • Instruction Fuzzy Hash: 6B21F170A18346DFDB20CF69E90875AFBF8EF01720F10466EE855D7280DB759A14CBA1
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,002C6C08,?,002BFA29,?,00000004,00000000,00000000,?,?,002C4979,?,00000000,00000004,?), ref: 002C6A51
                                                                      • SetLastError.KERNEL32(00000000,000000FF,?,002BFA29,?,00000004,00000000,00000000,?,?,002C4979,?,00000000,00000004,?), ref: 002C6A6B
                                                                      • SetLastError.KERNEL32(00000000,00000000,00000000,?,000000FF,?,002BFA29,?,00000004,00000000,00000000,?,?,002C4979,?,00000000), ref: 002C6AA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID: X0
                                                                      • API String ID: 1452528299-4193090317
                                                                      • Opcode ID: 9f714886cb0a54de8f4ca58513b6c17c5c3f25699988226c71788d5b98d55984
                                                                      • Instruction ID: 744ee56fb0506c96fb0c16f996490ec92d887f43b95657327564c647eb1b2eac
                                                                      • Opcode Fuzzy Hash: 9f714886cb0a54de8f4ca58513b6c17c5c3f25699988226c71788d5b98d55984
                                                                      • Instruction Fuzzy Hash: 4B019E3227D2517EE61637B4BC8EF2B2A1CDF84768B104B7DF805AA0A2EE614C215961
                                                                      APIs
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00254BCA
                                                                      • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00254BD0
                                                                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,00000000,00000000,00000000), ref: 00254BF3
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00254C1B
                                                                      • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00254C21
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$FreeProcess$FormatMessage
                                                                      • String ID:
                                                                      • API String ID: 1606019998-0
                                                                      • Opcode ID: 3ba55bdfe016d8236b54b22a1aa81f5d713806ce8d5142e939bcf2a9ee0b9973
                                                                      • Instruction ID: 698ba85b90911b0390d53630b97a56522563aa7fca9b1f6c148fb8a96093d23e
                                                                      • Opcode Fuzzy Hash: 3ba55bdfe016d8236b54b22a1aa81f5d713806ce8d5142e939bcf2a9ee0b9973
                                                                      • Instruction Fuzzy Hash: 631186B1A54219ABEB00EF94CC15FEFB7BCEB04B04F104515F914AB2C1D7B599148BA4
                                                                      APIs
                                                                      • SetEvent.KERNEL32(00000002,?,002AA8BE,2DDDF7D7), ref: 002B0B7F
                                                                      • GetLastError.KERNEL32(?,002AA8BE,2DDDF7D7), ref: 002B0B89
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,002AA8BE,2DDDF7D7), ref: 002B0B99
                                                                      • GetLastError.KERNEL32(?,002AA8BE,2DDDF7D7), ref: 002B0BA4
                                                                      • CloseHandle.KERNEL32(?,?,002AA8BE,2DDDF7D7), ref: 002B0BB2
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CloseEventHandleObjectSingleWait
                                                                      • String ID:
                                                                      • API String ID: 891035169-0
                                                                      • Opcode ID: 51524416199fefa1407ed453a162b8e3efb521830654feda993c7b5fa1231b98
                                                                      • Instruction ID: 06b36c6d65ccdd792fce058412b052a12adce13db9bb8d5caf7fc5456fec148b
                                                                      • Opcode Fuzzy Hash: 51524416199fefa1407ed453a162b8e3efb521830654feda993c7b5fa1231b98
                                                                      • Instruction Fuzzy Hash: 8AF03A302583439BDB715F39FC8CB9777E8BB043ADF148A59E866C62D0DB70D8048A60
                                                                      APIs
                                                                      • DeleteFileW.KERNEL32(?,2DDDF7D7,?), ref: 0027659F
                                                                      • CloseHandle.KERNEL32(?), ref: 00276744
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CloseDeleteFileHandle
                                                                      • String ID: ,i/$0i/
                                                                      • API String ID: 2633145722-3989723807
                                                                      • Opcode ID: d6cc92b48be0dcbbe388605a8b00c92840e8019905481994a924200b2f1da53b
                                                                      • Instruction ID: b48e35e81d9b4e45d9034c9b101c3cf73b892e72079c81f461a020759438a7a5
                                                                      • Opcode Fuzzy Hash: d6cc92b48be0dcbbe388605a8b00c92840e8019905481994a924200b2f1da53b
                                                                      • Instruction Fuzzy Hash: 80C1D330A01645CFDB05DF68C95876CBBB5EF09320F1982A9D859AB3D2DB349E06CF91
                                                                      APIs
                                                                        • Part of subcall function 0026FB40: SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,80000002,80000002,00310A68), ref: 0026FB50
                                                                        • Part of subcall function 0026FB40: LoadLibraryW.KERNEL32(Shell32.dll,?,80000002,80000002,00310A68), ref: 0026FB63
                                                                        • Part of subcall function 0026FB40: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 0026FB73
                                                                      • PathFileExistsW.SHLWAPI(?,ADVINST_LOGS,0000000C,00310A68), ref: 0026B710
                                                                        • Part of subcall function 00243620: RtlAllocateHeap.NTDLL(00000000,00000000,?,2DDDF7D7,00000000,002D5110,000000FF,?,?,0030B028,?,?,00281A0D,80004005,2DDDF7D7,?), ref: 0024366A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: AddressAllocateExistsFileFolderHeapLibraryLoadLocationPathProcSpecial
                                                                      • String ID: ADVINST_LOGS$Everyone
                                                                      • API String ID: 3321256476-3921853867
                                                                      • Opcode ID: 04c446a24854da25054192e715389dea90b3bcd4c655202412d54ae82d67e5e6
                                                                      • Instruction ID: fa681d2cf9ab378bf87b28bd461d66abd76c2b54050e84a002a71d930bee51b3
                                                                      • Opcode Fuzzy Hash: 04c446a24854da25054192e715389dea90b3bcd4c655202412d54ae82d67e5e6
                                                                      • Instruction Fuzzy Hash: 0BA1EE71D11209CBDB05DFA8C959BAEBBB4EF44324F244258E811AB391DB755E90CFA0
                                                                      APIs
                                                                      • PathIsUNCW.SHLWAPI(?,?,?,?,2DDDF7D7,*.*,?), ref: 00264150
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Path
                                                                      • String ID: *.*$\\?\$\\?\UNC\
                                                                      • API String ID: 2875597873-1700010636
                                                                      • Opcode ID: c41335442eed286588c75af19e938305f5d7bb087ced286e53db5352a00b8ed9
                                                                      • Instruction ID: cf0b163c328b5a47f806541c493d1517615416cb31d04347f91e588dd03fe418
                                                                      • Opcode Fuzzy Hash: c41335442eed286588c75af19e938305f5d7bb087ced286e53db5352a00b8ed9
                                                                      • Instruction Fuzzy Hash: 3F91E170A10216CFDB04EF68C858BAEB7B5FF05324F204269E915AB391C775AE90CBC0
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • GetLastError.KERNEL32 ref: 00293BD2
                                                                      • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00293C1F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorHeapLastObjectProcessSingleWait
                                                                      • String ID: IF-$REST %u
                                                                      • API String ID: 1530046183-2071377186
                                                                      • Opcode ID: 0288eab7a8fd03f0588cd67fbb8633e3f0f974d435f916a0ed07df70c5e17858
                                                                      • Instruction ID: ac6dd77a300247da7568fa0b313a4ddf97d0f099f200982fc16d09fe95415646
                                                                      • Opcode Fuzzy Hash: 0288eab7a8fd03f0588cd67fbb8633e3f0f974d435f916a0ed07df70c5e17858
                                                                      • Instruction Fuzzy Hash: 4351B131610A059FDF15DF28DC84B69BBB9FF44320F24426AE826AB3D1DB709E55CB90
                                                                      APIs
                                                                      • ReadFile.KERNEL32(?,?,00000002,?,00000000,?,00000000,00000000,?,?,002D2C2C,?,?,?), ref: 002D253A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: FileRead
                                                                      • String ID: ,,-$,,-$,,-
                                                                      • API String ID: 2738559852-2670300124
                                                                      • Opcode ID: 5e6fa204ca95ac6815b1769e9d42e8eae1b59f4bc497ff9c25441c3198676f37
                                                                      • Instruction ID: ad78e53ae09068d0e506b1dc771bdb2747ce27e0419f004adc55cda137e21b58
                                                                      • Opcode Fuzzy Hash: 5e6fa204ca95ac6815b1769e9d42e8eae1b59f4bc497ff9c25441c3198676f37
                                                                      • Instruction Fuzzy Hash: 3A512431A18216EBCB14CF48D890BADB7B1EF69310F64815BE545AB390D370AE94DBA1
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000), ref: 00281AB2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID: .url$URL
                                                                      • API String ID: 823142352-2674294872
                                                                      • Opcode ID: 4ebb41ff6171d4719ac032e48b7baea8ec6eca5ea38669134c7aea06158e6d30
                                                                      • Instruction ID: 78ddc793f90a502180b0f80bc1a69b04b1dc00b94e31f44165d12354929d5a1d
                                                                      • Opcode Fuzzy Hash: 4ebb41ff6171d4719ac032e48b7baea8ec6eca5ea38669134c7aea06158e6d30
                                                                      • Instruction Fuzzy Hash: B331D271C11248ABD724EF58DD46B9EBBB8EB04710F1042A9EA24773C1DBB01A24CFA5
                                                                      APIs
                                                                      • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,?,00000000,80070057,80004005), ref: 00291AEE
                                                                      • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,80070057,80004005), ref: 00291B19
                                                                      • GetLastError.KERNEL32 ref: 00291B83
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CreateEvent$ErrorLast
                                                                      • String ID: AdvancedInstaller
                                                                      • API String ID: 1131763895-1372594473
                                                                      • Opcode ID: d18f523b7a2ce636a5f72c411e2bb5265e4905188f025a864b9e6dc3b2e2c008
                                                                      • Instruction ID: 8db60a4767d8e12f76c460e8c096fe072e6ad10bb8da2488b166f647a62c2bfd
                                                                      • Opcode Fuzzy Hash: d18f523b7a2ce636a5f72c411e2bb5265e4905188f025a864b9e6dc3b2e2c008
                                                                      • Instruction Fuzzy Hash: 2D219331650305ABDB10AF61DC99F657BA9EB44709F104059FA029F2D6EB72A811CB54
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(002F37E8,00000000,00000800,?,002B92D8,?,?,00000000,?,?,?,002B9402,00000002,FlsGetValue,002EAA18,FlsGetValue), ref: 002B9334
                                                                      • GetLastError.KERNEL32(?,002B92D8,?,?,00000000,?,?,?,002B9402,00000002,FlsGetValue,002EAA18,FlsGetValue,?,?,002B65FB), ref: 002B933E
                                                                      • LoadLibraryExW.KERNEL32(002F37E8,00000000,00000000,0026CFDC,002F37E8,00000002,2DDDF7D7), ref: 002B9366
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$ErrorLast
                                                                      • String ID: api-ms-
                                                                      • API String ID: 3177248105-2084034818
                                                                      • Opcode ID: 3d8174da0c79b4521d8865edcfb1608740ea0b4e7e99c65a209cd47b287837e9
                                                                      • Instruction ID: 0359ffcef5ae2563789bf7592534a7ae542faa7828f513f962f2670404b79126
                                                                      • Opcode Fuzzy Hash: 3d8174da0c79b4521d8865edcfb1608740ea0b4e7e99c65a209cd47b287837e9
                                                                      • Instruction Fuzzy Hash: 9DE04F302D8249F7EB201F61FD4AB993F99AB00B95F1040A0FB0CA80E1D762E8B58A45
                                                                      APIs
                                                                      • GetTempFileNameW.KERNEL32(?,00000000,00000000,?,2DDDF7D7,?,00000004), ref: 002448C8
                                                                      • MoveFileW.KERNEL32(?,00000000), ref: 00244C9B
                                                                      • DeleteFileW.KERNEL32(?), ref: 00244CE5
                                                                      • FreeLibrary.KERNEL32(?), ref: 00244F7B
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$DeleteFreeLibraryMoveNameTemp
                                                                      • String ID:
                                                                      • API String ID: 2027907882-0
                                                                      • Opcode ID: 7a1f1e8f50e61a6a4f870b2b700046678914adfb0797e930b28ddf6559be002b
                                                                      • Instruction ID: 4c96b98592be9da129080337d989af39a10021b163a1b37f3b3af64153a85032
                                                                      • Opcode Fuzzy Hash: 7a1f1e8f50e61a6a4f870b2b700046678914adfb0797e930b28ddf6559be002b
                                                                      • Instruction Fuzzy Hash: 0C126B70D242699ACB28EF24CC987ADB7B1FF54304F2042D9E449A7691EB756F94CF80
                                                                      APIs
                                                                      • GetConsoleOutputCP.KERNEL32(2DDDF7D7,00000000,00000000,000000FE), ref: 002C9F79
                                                                        • Part of subcall function 002CCA8B: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,00000000,?,-00000008,-00000008,00000000,?,?,002C9D6A,?,00000000), ref: 002CCAEA
                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 002CA1CF
                                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 002CA215
                                                                      • GetLastError.KERNEL32 ref: 002CA2B8
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                      • String ID:
                                                                      • API String ID: 2112829910-0
                                                                      • Opcode ID: 4e6883bec2063fd797c94ece5e8bd6926ac9adb087fbd9f3dc5386315d3b9d1e
                                                                      • Instruction ID: ccb45aa480912e4c78a6f5c320947534f4bf887b34aab8755483e864884aa02b
                                                                      • Opcode Fuzzy Hash: 4e6883bec2063fd797c94ece5e8bd6926ac9adb087fbd9f3dc5386315d3b9d1e
                                                                      • Instruction Fuzzy Hash: EDD19B75D1425C9FCB05CFE8C884AADBBB9FF09304F28822EE825EB251D631A951CB51
                                                                      APIs
                                                                      • GetShortPathNameW.KERNEL32(?,00000000,00000000), ref: 002759D2
                                                                      • GetShortPathNameW.KERNEL32(?,?,?), ref: 00275A51
                                                                      • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00275AA1
                                                                      • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,-00000001,00000000,00000000), ref: 00275AD7
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiNamePathShortWide
                                                                      • String ID:
                                                                      • API String ID: 3379522384-0
                                                                      • Opcode ID: 23c24965715704b804d0cd7329213490e998e64289dd430ce438008988740ca3
                                                                      • Instruction ID: d15d1638ce2e1ad14c7f48e35e32001d78374ee25599c15cdb0ab34b86aa3849
                                                                      • Opcode Fuzzy Hash: 23c24965715704b804d0cd7329213490e998e64289dd430ce438008988740ca3
                                                                      • Instruction Fuzzy Hash: 9951BE71A10616AFDB14DF68DC89B6EF7A9FF44324F108229E9199B390DB71AC11CF90
                                                                      APIs
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000,?,00000000,?,?,?,00281B33,?,00000003), ref: 002832FD
                                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,00281B33,?,00000003), ref: 0028330E
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,?,?), ref: 0028332F
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,?,?), ref: 00283381
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 1717984340-0
                                                                      • Opcode ID: e9414ee19dfcee4560e39cc38b1674907eadf1a5b7ae12c05126165d3df37145
                                                                      • Instruction ID: 4bc0753a0d7f196bfd696b7746eb861f5fb42c9fe5026d2a36accd8999cdf5d8
                                                                      • Opcode Fuzzy Hash: e9414ee19dfcee4560e39cc38b1674907eadf1a5b7ae12c05126165d3df37145
                                                                      • Instruction Fuzzy Hash: 2C412E79625302FBE710BF649C81F6B7698EF04B04F144529FE45E91C1EAA2DA308795
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorEventLast
                                                                      • String ID:
                                                                      • API String ID: 3848097054-0
                                                                      • Opcode ID: 485a0490a131cc09df22c9d57d7397d272aae11b5e4611676ffa1a83125c38c6
                                                                      • Instruction ID: ac29acf3b3749e0fee455899de71407a6bff73b59fa559d3ac6ccdbffa68c984
                                                                      • Opcode Fuzzy Hash: 485a0490a131cc09df22c9d57d7397d272aae11b5e4611676ffa1a83125c38c6
                                                                      • Instruction Fuzzy Hash: AC6125B1A11311CFEB25CF18D8D879A3BE5BF44354F0542A8DD489F28AE7B6D858CB90
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID: C*)$GET$E-
                                                                      • API String ID: 1452528299-1018771185
                                                                      • Opcode ID: 5be3f1bb54318b8395c751a0f432cd84a75791b86e63c9faebf0da8ab4ddb3ab
                                                                      • Instruction ID: e4ff1343e14a1272073432ad4ef191b7550ae120c848c6c9e8f7602431e3039e
                                                                      • Opcode Fuzzy Hash: 5be3f1bb54318b8395c751a0f432cd84a75791b86e63c9faebf0da8ab4ddb3ab
                                                                      • Instruction Fuzzy Hash: F9418371D1060A9BDB10EFA5CC49BAEBBB8FF44320F104529E911A7391DB749A24CFA1
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,2DDDF7D7,?,?,?), ref: 0028EFDA
                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0028F00B
                                                                      • ReadFile.KERNEL32(?,00000000,00010000,?,00000000,00010000), ref: 0028F096
                                                                      • CloseHandle.KERNEL32(00000000), ref: 0028F162
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseCreateHandleReadSize
                                                                      • String ID:
                                                                      • API String ID: 3919263394-0
                                                                      • Opcode ID: 6957fb45851b5e2ee0db6f29c78bd226f79af42dd0952c5877de3774bad7b4f2
                                                                      • Instruction ID: 2d019857a41d07bfd201be46dca9da328338bb67d64ea837f2f03368798b8221
                                                                      • Opcode Fuzzy Hash: 6957fb45851b5e2ee0db6f29c78bd226f79af42dd0952c5877de3774bad7b4f2
                                                                      • Instruction Fuzzy Hash: E7510171911258DFEB609F64CD85BEEBBB8FF51310F2081A9E549A72C2DB701A89CF50
                                                                      APIs
                                                                      • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,?,2DDDF7D7,00000000,002F49E0,?,?,?,?,?,?,?,002DA86D), ref: 0026167A
                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,002DA86D,000000FF), ref: 00261692
                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,002DA86D,000000FF), ref: 0026171F
                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,002DA86D,000000FF), ref: 0026174E
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Close$Open
                                                                      • String ID:
                                                                      • API String ID: 2976201327-0
                                                                      • Opcode ID: e5fd87b08d7a5c3d9dff12b55b893b14e3d02d7524a3ca600401a4e2ee2de478
                                                                      • Instruction ID: 7bc0776b044d275ad3d1aab8fef3cd9195ebdfa7e34844407af51a6fedc0ad0a
                                                                      • Opcode Fuzzy Hash: e5fd87b08d7a5c3d9dff12b55b893b14e3d02d7524a3ca600401a4e2ee2de478
                                                                      • Instruction Fuzzy Hash: F94108B1901219ABDB21DFA5CD89BEFBBF8EF08350F144119E915A7280D774AA54CBA0
                                                                      APIs
                                                                      • SendMessageW.USER32(?), ref: 0028DDE2
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • SetWindowTextW.USER32(?,00000010), ref: 0028DE2A
                                                                      • IsWindow.USER32(00000406), ref: 0028DEB6
                                                                      • EndDialog.USER32(00000406,00000001), ref: 0028DEE6
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$DialogHeapMessageProcessSendText
                                                                      • String ID:
                                                                      • API String ID: 3967821603-0
                                                                      • Opcode ID: 8b113f93bec3876800b786b4838308856cc78a484b9c8807cec359dd20053402
                                                                      • Instruction ID: 485edf9b42bcfaac8fac7a51d318b4c01c63f81740cc951ef6587b221c715209
                                                                      • Opcode Fuzzy Hash: 8b113f93bec3876800b786b4838308856cc78a484b9c8807cec359dd20053402
                                                                      • Instruction Fuzzy Hash: 56417975A00215AFCB11DF69DC88B5ABBB9FF48720F14416AED15EB3A0DB70AD10DB90
                                                                      APIs
                                                                        • Part of subcall function 00299F10: SetFilePointer.KERNEL32(?,00000000,?,00000001,2DDDF7D7,?,?,?,002D5130,000000FF), ref: 00299F45
                                                                        • Part of subcall function 00299F10: GetLastError.KERNEL32(?,00000000,?,00000001,2DDDF7D7,?,?,?,002D5130,000000FF), ref: 00299F52
                                                                      • GetLastError.KERNEL32 ref: 002A1A67
                                                                        • Part of subcall function 00299FB0: SetFilePointer.KERNEL32(?,?,?,?,2DDDF7D7,?,?,?,?,?,Function_00095600,000000FF), ref: 00299FEA
                                                                        • Part of subcall function 00299FB0: GetLastError.KERNEL32(?,?,?,?,2DDDF7D7,?,?,?,?,?,Function_00095600,000000FF), ref: 00299FF7
                                                                        • Part of subcall function 00299FB0: SetLastError.KERNEL32(00000000,?,?,?,?,2DDDF7D7,?,?,?,?,?,Function_00095600,000000FF), ref: 0029A00E
                                                                      • SetEndOfFile.KERNEL32(?), ref: 002A1A16
                                                                      • GetLastError.KERNEL32 ref: 002A1A29
                                                                      • SetLastError.KERNEL32(00000000), ref: 002A1A4E
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$File$Pointer
                                                                      • String ID:
                                                                      • API String ID: 4162258135-0
                                                                      • Opcode ID: 5de81dfadca6fa7553cbe4a1e4587b5ceaaafecbe8523d9425fa615c965e4879
                                                                      • Instruction ID: 2edce4eba808cbed3fb47382e22ce4880ed37d563823af1eba4b213ac4a86e48
                                                                      • Opcode Fuzzy Hash: 5de81dfadca6fa7553cbe4a1e4587b5ceaaafecbe8523d9425fa615c965e4879
                                                                      • Instruction Fuzzy Hash: 52213A327652079B8B20DF65AC04AABF799EF92375F14412AFD44C6162EB20CD34C6E1
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 002B0C4F
                                                                      • GetLastError.KERNEL32 ref: 002B0C5A
                                                                      • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 002B0CC4
                                                                      • GetLastError.KERNEL32 ref: 002B0CCE
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$ObjectReleaseSemaphoreSingleWait
                                                                      • String ID:
                                                                      • API String ID: 1636903514-0
                                                                      • Opcode ID: b45879d13cdfce927db23d250e571fb57cc44c7daf3d1aada59dcd88640f1f3e
                                                                      • Instruction ID: 329f9a3d6d336320f3a981d22a5b1163bc4e2eff5762991f3023ca69fbdf267b
                                                                      • Opcode Fuzzy Hash: b45879d13cdfce927db23d250e571fb57cc44c7daf3d1aada59dcd88640f1f3e
                                                                      • Instruction Fuzzy Hash: 2321F9322147428BD7328F29E8C8797BBE5AF90364F24871FE196865D1D771D864C750
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,?,2DDDF7D7,?,?,?,002D5130,000000FF), ref: 0028CC67
                                                                      • GetExitCodeThread.KERNEL32(?,?,?,?,?,002D5130,000000FF), ref: 0028CC81
                                                                      • TerminateThread.KERNEL32(?,00000000,?,?,?,002D5130,000000FF), ref: 0028CC99
                                                                      • CloseHandle.KERNEL32(?,?,?,?,002D5130,000000FF), ref: 0028CCA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$CloseCodeExitHandleObjectSingleTerminateWait
                                                                      • String ID:
                                                                      • API String ID: 3774109050-0
                                                                      • Opcode ID: a0c1cd08568c073ad372c4c4bceadec8d3624847f3af20f8307bc26082e3d417
                                                                      • Instruction ID: 2d24cbe88bf14d97c2e3c67345ab27ce6cf4f0bc8b4eb07439d94ca8bd0d0bb2
                                                                      • Opcode Fuzzy Hash: a0c1cd08568c073ad372c4c4bceadec8d3624847f3af20f8307bc26082e3d417
                                                                      • Instruction Fuzzy Hash: 1A112530654705EFDB209F14DC48B6ABBF8FB04711F10462AF829D26D0D7B0A824CB60
                                                                      APIs
                                                                      • IsWindow.USER32(?), ref: 0028CFBD
                                                                      • DestroyWindow.USER32(?), ref: 0028CFCA
                                                                      • IsWindow.USER32(?), ref: 0028D024
                                                                      • SendMessageW.USER32(?,00000407,00000000,?), ref: 0028D03D
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Window$DestroyMessageSend
                                                                      • String ID:
                                                                      • API String ID: 746073012-0
                                                                      • Opcode ID: bdbcff08786fa1963cc083c25e62ea2eae093bbaea3ef931e69ba9ea9ffda125
                                                                      • Instruction ID: dbb98a640b68123813cb0651d83eda7ed4f9a571d2fd742d1cd5b8a7684480cc
                                                                      • Opcode Fuzzy Hash: bdbcff08786fa1963cc083c25e62ea2eae093bbaea3ef931e69ba9ea9ffda125
                                                                      • Instruction Fuzzy Hash: F1116A345093419FE360DF25D888B5ABBE1FF98700F50891EF89AC62A0D370E994DF52
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,?,2DDDF7D7,?,?,?,002D5130,000000FF), ref: 0028CD17
                                                                      • GetExitCodeThread.KERNEL32(?,?,?,?,?,002D5130,000000FF), ref: 0028CD31
                                                                      • TerminateThread.KERNEL32(?,00000000,?,?,?,002D5130,000000FF), ref: 0028CD49
                                                                      • CloseHandle.KERNEL32(?,?,?,?,002D5130,000000FF), ref: 0028CD52
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$CloseCodeExitHandleObjectSingleTerminateWait
                                                                      • String ID:
                                                                      • API String ID: 3774109050-0
                                                                      • Opcode ID: c4e9f42d6400cff14e88b8d3c86a7364503a5a1ce239374324182a1511185fc1
                                                                      • Instruction ID: 2ffacce8288a18820b2ee0c3c3dc28831e8c8a5f92e9ba3fdd3f743b5f0b1bc8
                                                                      • Opcode Fuzzy Hash: c4e9f42d6400cff14e88b8d3c86a7364503a5a1ce239374324182a1511185fc1
                                                                      • Instruction Fuzzy Hash: 8A01B135558746EFDB209F54EC48B66BBF8FB04B10F108A2EF966D66E0D770A810CB50
                                                                      APIs
                                                                      • SetEvent.KERNEL32(?), ref: 002B0D62
                                                                      • GetLastError.KERNEL32 ref: 002B0D6C
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 002B0D77
                                                                      • GetLastError.KERNEL32 ref: 002B0D82
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$EventObjectSingleWait
                                                                      • String ID:
                                                                      • API String ID: 3600396749-0
                                                                      • Opcode ID: ea048c7739cdaa6653cad81632a49f298257cd5ed486e1b9bcdf6a89eb5c604e
                                                                      • Instruction ID: aa33cfebecf5ed1df95b68fa14b47f8df4b5857551d1355bfa405cfb0f4de53f
                                                                      • Opcode Fuzzy Hash: ea048c7739cdaa6653cad81632a49f298257cd5ed486e1b9bcdf6a89eb5c604e
                                                                      • Instruction Fuzzy Hash: 690171326147439FD7218FA9E8C8B4BBBE4EF94760F148A1DE1A5872D0C371B8609B60
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,0000040A), ref: 00284432
                                                                      • SetWindowTextW.USER32(00000000,00000009), ref: 0028443D
                                                                      • GetDlgItem.USER32(00000000,0000040B), ref: 0028444E
                                                                      • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 0028445F
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Item$MessageSendTextWindow
                                                                      • String ID:
                                                                      • API String ID: 2101643998-0
                                                                      • Opcode ID: 946ceece3ce8300427afacf0d3f6f5d549ef70209dc956365a0df83e95a8c86a
                                                                      • Instruction ID: 64642421ee2b1389cd3975fa03c89e17bc854813652b30d34a6454ee196c97d5
                                                                      • Opcode Fuzzy Hash: 946ceece3ce8300427afacf0d3f6f5d549ef70209dc956365a0df83e95a8c86a
                                                                      • Instruction Fuzzy Hash: 24013C72644602FBDB059FA4EC48E5AFB79FF48B11B048119F705A69B0D731A872DB90
                                                                      APIs
                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_0004CE80,?,00000000,?), ref: 0028CD95
                                                                      • GetLastError.KERNEL32(?,00000000,?), ref: 0028CDA2
                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0028CDB9
                                                                      • GetExitCodeThread.KERNEL32(?,?), ref: 0028CDC7
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$CodeCreateErrorExitLastObjectSingleWait
                                                                      • String ID:
                                                                      • API String ID: 2732711357-0
                                                                      • Opcode ID: f18e6d4c66622c07257ba0735c85b2e82582a589b09ac1971b6bc496507c80f4
                                                                      • Instruction ID: 66ea79d11fb677d7abedc49efc28ccd30e18247d36c3463b53b2d47b1fdef500
                                                                      • Opcode Fuzzy Hash: f18e6d4c66622c07257ba0735c85b2e82582a589b09ac1971b6bc496507c80f4
                                                                      • Instruction Fuzzy Hash: 5DF06235548301ABD720EF68FC49F87BBE4EB54711F10852AF889D2190E730A518C7B2
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 002B0B25
                                                                      • GetLastError.KERNEL32 ref: 002B0B30
                                                                      • SetEvent.KERNEL32(?), ref: 002B0B4F
                                                                      • GetLastError.KERNEL32 ref: 002B0B59
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$EventObjectSingleWait
                                                                      • String ID:
                                                                      • API String ID: 3600396749-0
                                                                      • Opcode ID: 6b885489b4e44eb458de7d91c93b8e37f36477914dd72f53bfa33bda9b9e1ead
                                                                      • Instruction ID: ae216dfba67ef5c8b38f802979481151844ced3921b62e2a0f228a0ce2dd63c2
                                                                      • Opcode Fuzzy Hash: 6b885489b4e44eb458de7d91c93b8e37f36477914dd72f53bfa33bda9b9e1ead
                                                                      • Instruction Fuzzy Hash: 7FF082315181418FCB215F24FC8CA6B7BA1BF45378F144A18E1628B1F0C7309C50DB50
                                                                      APIs
                                                                      • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 002B5597
                                                                      • GetCurrentThreadId.KERNEL32 ref: 002B55A6
                                                                      • GetCurrentProcessId.KERNEL32 ref: 002B55AF
                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 002B55BC
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID:
                                                                      • API String ID: 2933794660-0
                                                                      • Opcode ID: 853eb9c985361e2c13292f03790b8a8c8a48fdc7682df88a7068ce3687866156
                                                                      • Instruction ID: 36597b55f1e495ca2aa41f4cb12b408b9101ad86972f689e1c08fd1b33147f4e
                                                                      • Opcode Fuzzy Hash: 853eb9c985361e2c13292f03790b8a8c8a48fdc7682df88a7068ce3687866156
                                                                      • Instruction Fuzzy Hash: C4F05F71C14209EBCF00DBB4EA8DA9EBBF8EF18315F914595A512EB150D734AB049B51
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • DeleteFileW.KERNEL32(?), ref: 0028B795
                                                                      • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0028B91D
                                                                        • Part of subcall function 00268BF0: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,2DDDF7D7,00000000,?), ref: 00268C34
                                                                        • Part of subcall function 00268BF0: ReadFile.KERNEL32(00000000,?,000003FF,00000000,00000000,?,80000000,00000003,00000000,00000003,00000080,00000000,2DDDF7D7,00000000), ref: 00268C77
                                                                        • Part of subcall function 00269B20: LoadStringW.USER32(?,80003641,00000514,2DDDF7D7), ref: 00269B78
                                                                      Strings
                                                                      • --verbose --log-file="%s" --remove-pack-file "%s" "%s", xrefs: 0028B738
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$Delete$CreateHeapLoadProcessReadString
                                                                      • String ID: --verbose --log-file="%s" --remove-pack-file "%s" "%s"
                                                                      • API String ID: 856989409-3685554107
                                                                      • Opcode ID: 28ac4da8f39f1d13b6309520ac42f97f9df84427986404dd165d18fdce3d983b
                                                                      • Instruction ID: bcd6caae8e3cf11a5a69b80d30bb5f6643685b87b8aedabb668c1aaae3d62a54
                                                                      • Opcode Fuzzy Hash: 28ac4da8f39f1d13b6309520ac42f97f9df84427986404dd165d18fdce3d983b
                                                                      • Instruction Fuzzy Hash: 33B1E235A006459FCB05EF68C894AADBBB5EF48320F18426CE915EB3D2DB34AD15CF91
                                                                      APIs
                                                                      • GetSystemDefaultLangID.KERNEL32(2DDDF7D7,00000000,?,?,?,2DDDF7D7), ref: 002851B7
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                        • Part of subcall function 00294DC0: GetLocaleInfoW.KERNEL32(00000000,00000002,002F37C0,00000000), ref: 00294E41
                                                                        • Part of subcall function 00294DC0: GetLocaleInfoW.KERNEL32(00000000,00000002,?,-00000001,00000078,-00000001), ref: 00294E7D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale$DefaultHeapLangProcessSystem
                                                                      • String ID: SystemDefault LangID=$h1
                                                                      • API String ID: 2240978303-480356336
                                                                      • Opcode ID: e45317b7b504cf4a3124a87c4abb09fbaba7249406371e7dc6004f27e4ce84f1
                                                                      • Instruction ID: 6eaec8430036b106143a4fe4b9f141c5d356d8db666341b7f784b401075e08c3
                                                                      • Opcode Fuzzy Hash: e45317b7b504cf4a3124a87c4abb09fbaba7249406371e7dc6004f27e4ce84f1
                                                                      • Instruction Fuzzy Hash: D071E535A11A268BCB04EF68C8446AEB7B5FF44320F1942A9E821A73D1DB74AD11CF90
                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,2DDDF7D7,?,80000002,80000002), ref: 0026BB53
                                                                      • LeaveCriticalSection.KERNEL32(?,2DDDF7D7,80000002,00000000,002D4F60,000000FF,?,80004005,?,80000002,80000002), ref: 0026BCCF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalFileLeaveModuleNameSection
                                                                      • String ID: LOG
                                                                      • API String ID: 1232429956-429402703
                                                                      • Opcode ID: 90ff835150a9beecc6a855dc0d3d8770e669b1d90579a72b3d7ecb82deb164ec
                                                                      • Instruction ID: d78e1628d247d26f864ab5b68ae4ad10ab9486986cf615d28b2d1dd6c9207842
                                                                      • Opcode Fuzzy Hash: 90ff835150a9beecc6a855dc0d3d8770e669b1d90579a72b3d7ecb82deb164ec
                                                                      • Instruction Fuzzy Hash: E6511131A102499FDB16DF28CC457AAB7B9FF44304F54856AEC0ACB391EB719E948B90
                                                                      APIs
                                                                      • PathIsUNCW.SHLWAPI(?,2DDDF7D7), ref: 00246A52
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: Path
                                                                      • String ID: \\?\$\\?\UNC\
                                                                      • API String ID: 2875597873-3019864461
                                                                      • Opcode ID: 75c8422fce67fde1afbbf20f4ed6a3964d49e3f025ce51005218e4022f8e49c8
                                                                      • Instruction ID: f06398f97646b4a30ef9bfe8af7082d0782c1d536f82b1e7c415204abcb78f4e
                                                                      • Opcode Fuzzy Hash: 75c8422fce67fde1afbbf20f4ed6a3964d49e3f025ce51005218e4022f8e49c8
                                                                      • Instruction Fuzzy Hash: AE51DFB0D20605DBDB18DF68C849BAEF7F4FF45308F10861AE851B7281DBB56958CBA1
                                                                      APIs
                                                                      • GetTempPathW.KERNEL32(00000104,80000002,2DDDF7D7,?,80000002,00310A68), ref: 0026B97F
                                                                      • CreateDirectoryW.KERNEL32(80000002,00000000,?,80000002,00310A68), ref: 0026B9E0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectoryPathTemp
                                                                      • String ID: ADVINST_LOGS
                                                                      • API String ID: 2885754953-2492584244
                                                                      • Opcode ID: af4ff661ea75ae6a54bbb62ea4cbcf71a3d09b3a5333a1c4ce368dbf32543377
                                                                      • Instruction ID: 3c471d0cd8015cf0208250e456d13138fbc217dfaabec5cc4be02be5ab111537
                                                                      • Opcode Fuzzy Hash: af4ff661ea75ae6a54bbb62ea4cbcf71a3d09b3a5333a1c4ce368dbf32543377
                                                                      • Instruction Fuzzy Hash: 6451E27592021ACBCB319F68C8447BAB3B4FF14314F2445AEE859D7290EB748ED1CB90
                                                                      APIs
                                                                      • InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,2DDDF7D7,00000000,00000000), ref: 002629C8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalInitializeSection
                                                                      • String ID: 8F/
                                                                      • API String ID: 32694325-3637229792
                                                                      • Opcode ID: 38223d4884e90afbf3f6661af485888d9933aa88f9585cb1f4d9dee36abc8bd9
                                                                      • Instruction ID: a87ad840996eaba6e2f4708bc832002938af01b5821912cd97c88a58eb0a4c61
                                                                      • Opcode Fuzzy Hash: 38223d4884e90afbf3f6661af485888d9933aa88f9585cb1f4d9dee36abc8bd9
                                                                      • Instruction Fuzzy Hash: BB51AC35A10719CBDB24CF10CC94BAEB7B4FF89714F044699D80A67680EB756E98CF82
                                                                      APIs
                                                                        • Part of subcall function 002439B0: GetProcessHeap.KERNEL32 ref: 00243A05
                                                                      • WriteFile.KERNEL32(?,00000005,?,?,00000000,002F37E8,00000002,?,00000000,CPU: ,00000005), ref: 0026B201
                                                                      • FlushFileBuffers.KERNEL32(?), ref: 0026B20A
                                                                        • Part of subcall function 00245350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0025E648,-00000010), ref: 00245373
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: File$BuffersFindFlushHeapProcessResourceWrite
                                                                      • String ID: CPU:
                                                                      • API String ID: 2793600070-1724696780
                                                                      • Opcode ID: 28df0a745ec6a8ed7f562545d20a8253f5152ed383dceccdc545313db2e3f4d2
                                                                      • Instruction ID: fe4dce994dce36484afd7053dee4ae7df48e832c498ef40cef7c2f29061bb679
                                                                      • Opcode Fuzzy Hash: 28df0a745ec6a8ed7f562545d20a8253f5152ed383dceccdc545313db2e3f4d2
                                                                      • Instruction Fuzzy Hash: 8841BD31A00619ABCB05DFA8CC59BAEBBB8FF04320F144669E910A73D1DB74AD11CF90
                                                                      APIs
                                                                      • EncodePointer.KERNEL32(00000000,?), ref: 002B895B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: EncodePointer
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 2118026453-2084237596
                                                                      • Opcode ID: 8cfecfc2cceb3130ee7267b8f7d274329595ebeb6a457eb7622b3bd8a518bbf0
                                                                      • Instruction ID: 47bed2d1a70b2e15c8f5fd464a316bbf53daf0d4e7307f3927a158756d9d6c77
                                                                      • Opcode Fuzzy Hash: 8cfecfc2cceb3130ee7267b8f7d274329595ebeb6a457eb7622b3bd8a518bbf0
                                                                      • Instruction Fuzzy Hash: 8441797291020AEFDF15DF94CC81AEEBBB9BF08340F184059F918A7221DB359A60DF51
                                                                      APIs
                                                                      • InitializeCriticalSectionEx.KERNEL32(00310A3C,00000000,00000000,2DDDF7D7,?,002DA3A3,000000FF), ref: 002410A5
                                                                      • GetLastError.KERNEL32(?,002DA3A3,000000FF), ref: 002410AF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalErrorInitializeLastSection
                                                                      • String ID: ,1
                                                                      • API String ID: 3413597225-1697091110
                                                                      • Opcode ID: 146c3911a47a43115dfd7bc79867bf9d38a41ffbc78761ae4f7364b8e65d9896
                                                                      • Instruction ID: 143407cd470775d68661b94c6169f8d7562cd31284393d307f32536f16ab3e50
                                                                      • Opcode Fuzzy Hash: 146c3911a47a43115dfd7bc79867bf9d38a41ffbc78761ae4f7364b8e65d9896
                                                                      • Instruction Fuzzy Hash: 0B11A0B0654388DBD719CF51ED0879A7BE8FB08714F008259E8048B790D7F644A8CF41
                                                                      APIs
                                                                        • Part of subcall function 00260600: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,2DDDF7D7,?,Function_00095110,000000FF), ref: 00260627
                                                                        • Part of subcall function 00260600: GetLastError.KERNEL32(?,00000000,00000000,2DDDF7D7,?,Function_00095110,000000FF), ref: 00260631
                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,0024160A), ref: 002B1BDE
                                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0024160A), ref: 002B1BED
                                                                      Strings
                                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 002B1BE8
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                      • API String ID: 3511171328-631824599
                                                                      • Opcode ID: 9241651a22c825829729522c053658e64cb658fcebfc50af4361cf3a6019a3a1
                                                                      • Instruction ID: 6ac2201363ddc1e3645af97ba747a63cb3476786a3eeaae9bc068eefd6e3fa5b
                                                                      • Opcode Fuzzy Hash: 9241651a22c825829729522c053658e64cb658fcebfc50af4361cf3a6019a3a1
                                                                      • Instruction Fuzzy Hash: 73E092702503818FD7309F29E5487C67BE8AF04348F40896DE946C6250EBB0D4B4CFA1
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(00000000), ref: 002AD0DD
                                                                      • GetLastError.KERNEL32 ref: 002AD0E7
                                                                      • CloseHandle.KERNEL32(00000000), ref: 002AD10E
                                                                      • GetLastError.KERNEL32 ref: 002AD118
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CloseErrorHandleLast
                                                                      • String ID:
                                                                      • API String ID: 918212764-0
                                                                      • Opcode ID: 9bf9debdf5c41d1e5ba9e00936a502385a6489b5503302ec94ac85d5c6cba36a
                                                                      • Instruction ID: eaf3620b18ab92502e7ad243030a35ff8c5afe1c38d6c4eb0c7a34b1d1fc68bc
                                                                      • Opcode Fuzzy Hash: 9bf9debdf5c41d1e5ba9e00936a502385a6489b5503302ec94ac85d5c6cba36a
                                                                      • Instruction Fuzzy Hash: 0C3101B0914205DFDB20DF64C988B4ABBF8FF05750F104269E8259B680DB71A910CFE0
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(00000001,2DDDF7D7), ref: 002A46E9
                                                                      • GetLastError.KERNEL32 ref: 002A46F3
                                                                      • CloseHandle.KERNEL32(00000001,2DDDF7D7), ref: 002A4714
                                                                      • GetLastError.KERNEL32 ref: 002A471E
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.1051609808.0000000000241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00240000, based on PE: true
                                                                      • Associated: 00000008.00000002.1051572662.0000000000240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051772778.00000000002E7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051830660.000000000030E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000008.00000002.1051865260.0000000000318000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_240000_aipackagechainer.jbxd
                                                                      Similarity
                                                                      • API ID: CloseErrorHandleLast
                                                                      • String ID:
                                                                      • API String ID: 918212764-0
                                                                      • Opcode ID: b648e0f4c111c9a9fab8c2e5cff0991c77dc673ca2f655ecdf0eb8e3333bb163
                                                                      • Instruction ID: a55112c4977fb3099edaac2937c6221e4db5982f8ceaa6fb4a7abd7ab83b3ab4
                                                                      • Opcode Fuzzy Hash: b648e0f4c111c9a9fab8c2e5cff0991c77dc673ca2f655ecdf0eb8e3333bb163
                                                                      • Instruction Fuzzy Hash: B321F271A14285DFCB20EF54DD88B5AFBF8EF42B54F144199E8049B281DBB0ED148BA0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.1116330584.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_7770000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'|q$p]pi
                                                                      • API String ID: 0-2912599733
                                                                      • Opcode ID: 80ccbf6bd6d8a80006fc2ccb7a05e81faaf0e3b2f319d71de3d425ec87d024e6
                                                                      • Instruction ID: 130bee50dd80bb500309d897e26d0f051bdc53e31ee578360082f6e60d294b41
                                                                      • Opcode Fuzzy Hash: 80ccbf6bd6d8a80006fc2ccb7a05e81faaf0e3b2f319d71de3d425ec87d024e6
                                                                      • Instruction Fuzzy Hash: 6001625165E3D10FC70717345D385A0AF31AF63240B8A02DBD180EF2A3CA290D0ACBA2
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.1071988206.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_4770000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 33302ddfb22ae70defbcaf9d35c7bdc03df2c671ca22cb390fdf2a02a723341a
                                                                      • Instruction ID: 0ed051e26d96784cd2ab7be326ee317fc06cc1df4396dfc54e8e66f1a603bc3b
                                                                      • Opcode Fuzzy Hash: 33302ddfb22ae70defbcaf9d35c7bdc03df2c671ca22cb390fdf2a02a723341a
                                                                      • Instruction Fuzzy Hash: 9D91CE74A002098FCB15CF59C4949BEFBB1FF88310B2586A9D825AB366D735FC51CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.1070084453.0000000002E5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E5D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_2e5d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: aeb1ca477f5f80e67ef21123870e301506d384bca393be943ea2717ca6acd93f
                                                                      • Instruction ID: fe3774b1101e7594881d4109d32157fb04a84e72cad40971f28f20d5e8ffe540
                                                                      • Opcode Fuzzy Hash: aeb1ca477f5f80e67ef21123870e301506d384bca393be943ea2717ca6acd93f
                                                                      • Instruction Fuzzy Hash: 30014C6104E3C09ED7128B258C94B52BFB8DF57228F1DC1DBD8988F2A7D2699849C772
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.1070084453.0000000002E5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E5D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_2e5d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 998e9c10953156e33beb9b81b1b4c18fa0f6a947b5a31ac67138ef45f9cac847
                                                                      • Instruction ID: 13d6d2b7d8d79d0daec4e1f12fa76555780258f471c82b84462779aacb14a742
                                                                      • Opcode Fuzzy Hash: 998e9c10953156e33beb9b81b1b4c18fa0f6a947b5a31ac67138ef45f9cac847
                                                                      • Instruction Fuzzy Hash: 7C01D631454350DAE7104E29CCC4BA7FFA8EF55378F18C05AED485B286D3799846C6B1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.1116330584.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_7770000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'|q$4'|q$4'|q$4'|q$tBqi
                                                                      • API String ID: 0-3733253139
                                                                      • Opcode ID: 5bf4c19621ea249a962ec4accdb152f2edd668723878c4f319548afc9798b029
                                                                      • Instruction ID: 48df83358f2c8195a9febcaf75f937d8b71e228ad304ccc86a45dc558d2d0500
                                                                      • Opcode Fuzzy Hash: 5bf4c19621ea249a962ec4accdb152f2edd668723878c4f319548afc9798b029
                                                                      • Instruction Fuzzy Hash: 7DA177B5B0434ACFCF249B2884107AABBB2AFD6391F24887AD505CB345DA71D952C7A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.1116330584.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_7770000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'|q$4'|q$$|q$$|q
                                                                      • API String ID: 0-2449595895
                                                                      • Opcode ID: 6b35677887a7e14a025b027d73494225820986e50b8e11bdb311c774d42cb9cc
                                                                      • Instruction ID: 84c1a219b4da92b807ac821425478bbbb32d452568c879ec068c547c030e0c67
                                                                      • Opcode Fuzzy Hash: 6b35677887a7e14a025b027d73494225820986e50b8e11bdb311c774d42cb9cc
                                                                      • Instruction Fuzzy Hash: DA01D66071E3D69FCB2B02691930265AFB65FD7A9076A48E7C480DF257CD598C06C3A3
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.1068376072.0000000004DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_4db0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 060f34044c3cc39f18c4660c7a290a78f35f31ee7272a6da96f00a1489563baa
                                                                      • Instruction ID: feaac48c8b170b9259258decb95626ce4bb15780e84e5e0f0dcd2e2c69dfcb0c
                                                                      • Opcode Fuzzy Hash: 060f34044c3cc39f18c4660c7a290a78f35f31ee7272a6da96f00a1489563baa
                                                                      • Instruction Fuzzy Hash: FDA18C74A042498FCB05CF58C4949EEFBB1FF49310B25859AD846AB361C735FC51CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.1067444036.00000000048DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 048DD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_48dd000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 308472266bcadfc64e9f0528114daccf8dcc4efdf6bcc4ac2f74105a17b24adb
                                                                      • Instruction ID: e2217d7a07340a246d513cee0191c2e9d5e6ee77a356e33e4fe05310a7b8ae2b
                                                                      • Opcode Fuzzy Hash: 308472266bcadfc64e9f0528114daccf8dcc4efdf6bcc4ac2f74105a17b24adb
                                                                      • Instruction Fuzzy Hash: 5101F731505344EAE710AE29DCC0B66FFD8EF91374F18CA1AED448A242D279AC45C6B1
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.1068376072.0000000004DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_4db0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bf3aa524b0197712f8ee2d0fa60a9f29e7baa7d298307d53fcd2e7ea3af6c886
                                                                      • Instruction ID: 554097787410c053b580541b2d2f66a9456f196fac845b756416c8b3d9e31f88
                                                                      • Opcode Fuzzy Hash: bf3aa524b0197712f8ee2d0fa60a9f29e7baa7d298307d53fcd2e7ea3af6c886
                                                                      • Instruction Fuzzy Hash: 68014F78B005159FDB00DB98D4906EEF771FF9E300B248259D85ADB361CA35EC039B90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.1067444036.00000000048DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 048DD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_48dd000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 23b5ad6c0916368ec086adb43114fcd87682e3baf6c6f7643f6edc61b8c8b21b
                                                                      • Instruction ID: c5d2eca2a8f2d3b82a6b36a46c8eff18b7e34b646d4cf1229701d62fa08dd0c3
                                                                      • Opcode Fuzzy Hash: 23b5ad6c0916368ec086adb43114fcd87682e3baf6c6f7643f6edc61b8c8b21b
                                                                      • Instruction Fuzzy Hash: CA015E6200E3C09FD7129B259C94B52BFF4DF53224F18C5DBD9888F293C269A849C7B2

                                                                      Execution Graph

                                                                      Execution Coverage:3.5%
                                                                      Dynamic/Decrypted Code Coverage:15.7%
                                                                      Signature Coverage:0.3%
                                                                      Total number of Nodes:2000
                                                                      Total number of Limit Nodes:61
                                                                      execution_graph 118499 fb105b 118504 fc0e5b 118499->118504 118501 fb106a 118535 fd06d4 28 API calls 118501->118535 118503 fb1074 118505 fc0e6b 118504->118505 118506 fbf38f 21 API calls 118505->118506 118507 fc0f21 118506->118507 118536 fb1155 118507->118536 118509 fc0f2a 118543 fcfd48 118509->118543 118512 fbf91b 21 API calls 118513 fc0f43 118512->118513 118549 fc2608 118513->118549 118516 fbf38f 21 API calls 118517 fc0f5b 118516->118517 118518 fbf9fa 21 API calls 118517->118518 118519 fc0f64 RegOpenKeyExW 118518->118519 118520 1006fd8 RegQueryValueExW 118519->118520 118521 fc0f86 118519->118521 118522 1006ff5 118520->118522 118523 100706e RegCloseKey 118520->118523 118521->118501 118524 fd045b 21 API calls 118522->118524 118523->118521 118534 1007080 118523->118534 118525 100700e 118524->118525 118555 fc2572 118525->118555 118530 fbf6ad 21 API calls 118530->118534 118532 fbfa3b 21 API calls 118532->118534 118533 fc2608 21 API calls 118533->118534 118534->118521 118534->118530 118534->118532 118534->118533 118535->118503 118558 ff1e50 118536->118558 118539 fbfa3b 21 API calls 118540 fb1188 118539->118540 118560 fb119f 118540->118560 118542 fb1192 118542->118509 118544 ff1e50 118543->118544 118545 fcfd55 GetFullPathNameW 118544->118545 118546 fcfd77 118545->118546 118547 fbf82c 21 API calls 118546->118547 118548 fc0f35 118547->118548 118548->118512 118550 fc2617 118549->118550 118554 fc2638 118549->118554 118552 fd045b 21 API calls 118550->118552 118551 fd042b 21 API calls 118553 fc0f52 118551->118553 118552->118554 118553->118516 118554->118551 118559 fb1162 GetModuleFileNameW 118558->118559 118559->118539 118561 ff1e50 118560->118561 118562 fb11ac GetFullPathNameW 118561->118562 118563 fb11cb 118562->118563 118564 fb11e8 118562->118564 118566 fbf82c 21 API calls 118563->118566 118565 fbf9fa 21 API calls 118564->118565 118567 fb11d7 118565->118567 118566->118567 118570 fbf433 118567->118570 118571 fbf441 118570->118571 118572 fbf9a0 21 API calls 118571->118572 118573 fb11e3 118572->118573 118573->118542 116886 fc397e 116889 fc3998 116886->116889 116890 fc39af 116889->116890 116891 fc39b4 116890->116891 116892 fc3a13 116890->116892 116929 fc3a11 116890->116929 116896 fc3a8d PostQuitMessage 116891->116896 116897 fc39c1 116891->116897 116894 10080b1 116892->116894 116895 fc3a19 116892->116895 116893 fc39f8 DefWindowProcW 116903 fc3992 116893->116903 116945 fbad2c 10 API calls 116894->116945 116898 fc3a45 SetTimer RegisterWindowMessageW 116895->116898 116899 fc3a20 116895->116899 116896->116903 116900 fc39cc 116897->116900 116901 100811e 116897->116901 116898->116903 116906 fc3a6e CreatePopupMenu 116898->116906 116904 1008052 116899->116904 116905 fc3a29 KillTimer 116899->116905 116907 fc39d6 116900->116907 116908 fc3a97 116900->116908 116950 101cde4 65 API calls 116901->116950 116912 1008057 116904->116912 116913 100808d MoveWindow 116904->116913 116941 fc35b3 Shell_NotifyIconW 116905->116941 116906->116903 116915 1008103 116907->116915 116916 fc39e1 116907->116916 116934 fc3619 116908->116934 116910 10080d2 116946 fbad46 40 API calls 116910->116946 116919 100807c SetFocus 116912->116919 116920 100805d 116912->116920 116913->116903 116915->116893 116949 1011bdd 21 API calls 116915->116949 116922 fc39ec 116916->116922 116923 fc3a7b 116916->116923 116917 1008130 116917->116893 116917->116903 116919->116903 116920->116922 116924 1008066 116920->116924 116921 fc3a3c 116942 fc514d DeleteObject DestroyWindow 116921->116942 116922->116893 116947 fc35b3 Shell_NotifyIconW 116922->116947 116943 fc36c0 75 API calls 116923->116943 116944 fbad2c 10 API calls 116924->116944 116929->116893 116930 fc3a8b 116930->116903 116932 10080f7 116948 fc34c7 60 API calls 116932->116948 116935 fc36b7 116934->116935 116936 fc3631 116934->116936 116935->116903 116951 fc37b5 116936->116951 116938 fc36a0 KillTimer SetTimer 116938->116935 116939 fc3658 116939->116938 116940 1007d46 Shell_NotifyIconW 116939->116940 116940->116938 116941->116921 116942->116903 116943->116930 116944->116903 116945->116910 116946->116922 116947->116932 116948->116929 116949->116929 116950->116917 116952 fc37d2 116951->116952 116970 fc38b7 116951->116970 116981 fbf6d1 116952->116981 116955 fc37ed 116986 fbf82c 116955->116986 116956 1007f87 LoadStringW 116959 1007fa1 116956->116959 116958 fc3802 116960 fc380f 116958->116960 116964 1007fbd 116958->116964 116967 fc3835 116959->116967 117016 fbfbc8 116959->117016 116960->116959 116961 fc3819 116960->116961 116998 fbf91b 116961->116998 116964->116967 116979 1008000 116964->116979 117020 fbf38f 116964->117020 116968 fc389d Shell_NotifyIconW 116967->116968 116968->116970 116970->116939 116974 100801f 116976 fbf91b 21 API calls 116974->116976 116975 1007ff2 116977 fbf78e 21 API calls 116975->116977 116978 1008030 116976->116978 116977->116979 116980 fbf91b 21 API calls 116978->116980 117026 fd016e 50 API calls 116979->117026 116980->116967 117027 fd045b 116981->117027 116983 fbf6f6 117037 fd042b 116983->117037 116985 fbf704 116985->116955 116985->116956 116987 fbf83c 116986->116987 116988 1006258 116986->116988 116991 fbf852 116987->116991 116992 fbf877 116987->116992 117063 fbf9a0 116988->117063 116990 1006261 116990->116990 117062 fbfb74 21 API calls 116991->117062 116994 fd042b 21 API calls 116992->116994 116996 fbf883 116994->116996 116995 fbf85a 116995->116958 116997 fd045b 21 API calls 116996->116997 116997->116995 116999 10062c2 116998->116999 117000 fbf932 116998->117000 117002 fd042b 21 API calls 116999->117002 117073 fbf8bc 117000->117073 117004 10062cc 117002->117004 117003 fbf93d 117007 fbf78e 117003->117007 117005 fd045b 21 API calls 117004->117005 117006 1006308 117005->117006 117008 fbf7a0 117007->117008 117009 10061ef 117007->117009 117088 fbf716 117008->117088 117098 1011b82 21 API calls 117009->117098 117013 10061f9 117017 fbfbdc 117016->117017 117019 fbfbeb 117016->117019 117018 fd045b 21 API calls 117017->117018 117017->117019 117018->117019 117019->116967 117021 fd045b 21 API calls 117020->117021 117022 fbf3a4 117021->117022 117023 fd042b 21 API calls 117022->117023 117024 fbf3b2 117023->117024 117025 101a7a8 22 API calls 117024->117025 117025->116975 117026->116974 117029 fd042b 117027->117029 117030 fd044a 117029->117030 117032 fd044c 117029->117032 117047 fde8ac 117029->117047 117054 fd4dd8 7 API calls 117029->117054 117030->116983 117036 fd0c79 117032->117036 117055 fd440c RaiseException 117032->117055 117035 fd0c96 117035->116983 117056 fd440c RaiseException 117036->117056 117040 fd0430 117037->117040 117038 fde8ac 20 API calls 117038->117040 117039 fd044a 117039->116985 117040->117038 117040->117039 117043 fd044c 117040->117043 117059 fd4dd8 7 API calls 117040->117059 117042 fd0c79 117061 fd440c RaiseException 117042->117061 117043->117042 117060 fd440c RaiseException 117043->117060 117046 fd0c96 117046->116985 117053 fe282e 117047->117053 117048 fe286c 117058 fe26cc 19 API calls 117048->117058 117049 fe2857 RtlAllocateHeap 117051 fe286a 117049->117051 117049->117053 117051->117029 117053->117048 117053->117049 117057 fd4dd8 7 API calls 117053->117057 117054->117029 117055->117036 117056->117035 117057->117053 117058->117051 117059->117040 117060->117042 117061->117046 117062->116995 117064 fbf9ae 117063->117064 117066 fbf9b7 117063->117066 117064->117066 117067 fbfaa1 117064->117067 117066->116990 117068 fbfab1 117067->117068 117069 fbfab4 117067->117069 117068->117066 117070 fd042b 21 API calls 117069->117070 117071 fbfabf 117070->117071 117072 fd045b 21 API calls 117071->117072 117072->117068 117074 fbf8cc 117073->117074 117075 fbf8df 117074->117075 117076 1006266 117074->117076 117083 fbf7b3 117075->117083 117078 fd042b 21 API calls 117076->117078 117080 1006270 117078->117080 117079 fbf8ec 117079->117003 117081 fd045b 21 API calls 117080->117081 117082 10062a3 117081->117082 117084 fbf7cb 117083->117084 117087 fbf7c4 117083->117087 117085 fd045b 21 API calls 117084->117085 117086 1006214 117084->117086 117085->117087 117087->117079 117089 fbf759 117088->117089 117090 fbf725 117088->117090 117090->117089 117098->117013 117099 12514a7 LdrInitializeThunk 118574 fb1098 118579 fc310d 118574->118579 118578 fb10a7 118580 fbf38f 21 API calls 118579->118580 118581 fc3124 GetVersionExW 118580->118581 118582 fbf82c 21 API calls 118581->118582 118583 fc3171 118582->118583 118584 fbf9a0 21 API calls 118583->118584 118586 fc31a7 118583->118586 118585 fc319b 118584->118585 118588 fbf433 21 API calls 118585->118588 118587 fc324c GetCurrentProcess IsWow64Process 118586->118587 118595 1007c2f 118586->118595 118589 fc3268 118587->118589 118588->118586 118590 1007c74 GetSystemInfo 118589->118590 118591 fc3280 LoadLibraryA 118589->118591 118592 fc32cf GetSystemInfo 118591->118592 118593 fc3291 GetProcAddress 118591->118593 118594 fc32a7 118592->118594 118593->118592 118596 fc32a1 GetNativeSystemInfo 118593->118596 118597 fc32ab FreeLibrary 118594->118597 118598 fb109d 118594->118598 118596->118594 118597->118598 118599 fd06d4 28 API calls 118598->118599 118599->118578 118600 fdeb9e 118601 fdebaa 118600->118601 118602 fdebcb 118601->118602 118603 fdebb6 118601->118603 118613 fd90a1 EnterCriticalSection 118602->118613 118619 fe26cc 19 API calls 118603->118619 118606 fdebbb 118620 fe2610 25 API calls 118606->118620 118607 fdebd7 118614 fdec0b 118607->118614 118612 fdebc6 118613->118607 118622 fdec36 118614->118622 118616 fdec18 118618 fdebe4 118616->118618 118642 fe26cc 19 API calls 118616->118642 118621 fdec01 LeaveCriticalSection 118618->118621 118619->118606 118620->118612 118621->118612 118623 fdec5e 118622->118623 118624 fdec44 118622->118624 118626 fdd7f5 25 API calls 118623->118626 118646 fe26cc 19 API calls 118624->118646 118628 fdec67 118626->118628 118627 fdec49 118647 fe2610 25 API calls 118627->118647 118643 fe9239 118628->118643 118630 fdec54 118630->118616 118633 fdecef 118637 fded0c 118633->118637 118639 fded1e 118633->118639 118634 fded6b 118635 fded78 118634->118635 118634->118639 118649 fe26cc 19 API calls 118635->118649 118648 fdef4f 30 API calls 118637->118648 118639->118630 118650 fdedcb 29 API calls 118639->118650 118640 fded16 118640->118630 118642->118618 118651 fe90b6 118643->118651 118645 fdec83 118645->118630 118645->118633 118645->118634 118646->118627 118647->118630 118648->118640 118649->118630 118650->118630 118652 fe90c2 118651->118652 118653 fe90ca 118652->118653 118654 fe90e2 118652->118654 118677 fe26b9 19 API calls 118653->118677 118656 fe9196 118654->118656 118660 fe911a 118654->118660 118682 fe26b9 19 API calls 118656->118682 118657 fe90cf 118678 fe26cc 19 API calls 118657->118678 118676 fe4f73 EnterCriticalSection 118660->118676 118661 fe919b 118683 fe26cc 19 API calls 118661->118683 118664 fe9120 118666 fe9159 118664->118666 118667 fe9144 118664->118667 118665 fe91a3 118684 fe2610 25 API calls 118665->118684 118670 fe91bb 27 API calls 118666->118670 118679 fe26cc 19 API calls 118667->118679 118669 fe90d7 118669->118645 118673 fe9154 118670->118673 118672 fe9149 118680 fe26b9 19 API calls 118672->118680 118681 fe918e LeaveCriticalSection 118673->118681 118676->118664 118677->118657 118678->118669 118679->118672 118680->118673 118681->118669 118682->118661 118683->118665 118684->118669 118685 fc3ad9 118686 fc4164 118685->118686 118687 fc4e5a GetWindowLongW 118686->118687 118691 fc4178 118687->118691 118688 fc426f DefDlgProcW 118696 fc41f1 118688->118696 118689 fc419b 118692 fc41f6 118689->118692 118693 fc41a7 118689->118693 118691->118688 118691->118689 118708 1008447 118691->118708 118694 fc41ff 118692->118694 118695 fc4228 118692->118695 118697 fc432d 118693->118697 118700 fc42e8 118693->118700 118701 fc41b6 118693->118701 118703 10085c0 118694->118703 118704 fc4205 118694->118704 118698 10085a3 118695->118698 118699 fc4236 118695->118699 118790 104a8ca 41 API calls 118697->118790 118801 1049495 28 API calls 118698->118801 118699->118703 118705 fc423f 118699->118705 118709 1008577 118700->118709 118710 fc42f3 118700->118710 118706 fc41bc 118701->118706 118707 10084e8 118701->118707 118702 100849d 118702->118696 118765 10084ba 118702->118765 118766 10084db 118702->118766 118798 10494ed 110 API calls 118703->118798 118711 fc420e 118704->118711 118712 fc428a 118704->118712 118714 10085f0 118705->118714 118741 1008623 118705->118741 118742 fc425a 118705->118742 118718 fc4349 118706->118718 118719 fc41c5 118706->118719 118789 1049ad7 84 API calls 118707->118789 118708->118702 118786 102c4ff 53 API calls 118708->118786 118796 1049fb4 98 API calls 118709->118796 118722 fc42fc 118710->118722 118723 1008565 118710->118723 118725 fc421c 118711->118725 118726 1008584 118711->118726 118716 fc42ad 118712->118716 118712->118726 118746 fc42a3 118712->118746 118732 100860b DefDlgProcW 118714->118732 118735 fc4e5a GetWindowLongW 118716->118735 118727 fc436d 118718->118727 118728 fc434b 118718->118728 118733 fc41ce 118719->118733 118734 fc4280 118719->118734 118737 fc4305 118722->118737 118738 100854f 118722->118738 118795 1049e05 CreateProcessW CloseHandle DefDlgProcW 118723->118795 118780 fc3f61 38 API calls 118725->118780 118729 10085a9 118726->118729 118730 100859a 118726->118730 118727->118696 118727->118702 118756 fc4381 118727->118756 118783 fc410d DefDlgProcW GetWindowLongW 118728->118783 118797 1049e3a ClientToScreen ImageList_DragMove DefDlgProcW 118729->118797 118730->118688 118730->118698 118731 10084d6 118731->118696 118732->118696 118748 fc41d7 118733->118748 118749 fc4361 118733->118749 118781 fc3fe0 59 API calls 118734->118781 118747 fc42b8 GetSysColor 118735->118747 118736 100847f 118736->118702 118762 fc4e5a GetWindowLongW 118736->118762 118751 fc430e 118737->118751 118752 1008539 118737->118752 118794 10499f9 6 API calls 118738->118794 118800 1049dba 22 API calls 118741->118800 118753 1008617 118742->118753 118754 fc4263 118742->118754 118746->118688 118746->118716 118759 fc42d6 SetBkColor 118747->118759 118760 fc42d3 118747->118760 118748->118688 118758 fc41e0 118748->118758 118784 fc3f00 DefDlgProcW PostMessageW PostMessageW GetWindowLongW 118749->118784 118763 1008523 118751->118763 118764 fc431a 118751->118764 118793 1049f78 GetWindowLongW DefDlgProcW 118752->118793 118799 1049b58 54 API calls 118753->118799 118754->118688 118769 10085dc IsThemeActive 118754->118769 118785 fc3f38 18 API calls 118756->118785 118779 fc3ae2 7 API calls 118758->118779 118782 fc4b00 22 API calls 118759->118782 118760->118759 118762->118702 118792 1049709 52 API calls 118763->118792 118775 100850c 118764->118775 118776 fc4323 118764->118776 118765->118688 118767 10084c4 118765->118767 118788 1049e94 GetWindowLongW GetWindowRect GetWindowRect MoveWindow 118766->118788 118787 104a94e 9 API calls 118767->118787 118769->118732 118791 104aca8 27 API calls 118775->118791 118776->118688 118776->118697 118779->118696 118780->118696 118781->118696 118782->118696 118783->118696 118784->118696 118785->118696 118786->118736 118787->118731 118788->118696 118789->118731 118790->118696 118791->118696 118792->118731 118793->118696 118794->118696 118795->118696 118796->118731 118797->118696 118798->118731 118799->118731 118800->118696 118801->118696 118802 ff95d9 118803 ff95e7 118802->118803 118805 fb9d61 118802->118805 118804 fb9e13 118806 fb9dfc 118805->118806 118809 fb1dd1 118805->118809 118806->118804 118817 fb24c6 21 API calls 118806->118817 118810 fb1ddf 118809->118810 118816 fb1e07 118809->118816 118811 fb1ded 118810->118811 118813 fb1dd1 21 API calls 118810->118813 118812 fb1df3 118811->118812 118814 fb1dd1 21 API calls 118811->118814 118812->118816 118818 fb3490 21 API calls 118812->118818 118813->118811 118814->118812 118816->118806 118817->118806 118818->118816 117100 fb1033 117105 fc4e91 117100->117105 117104 fb1042 117106 fbf38f 21 API calls 117105->117106 117107 fc4eff 117106->117107 117113 fc5c52 117107->117113 117110 fc4f9c 117111 fb1038 117110->117111 117116 fc5bc6 21 API calls 117110->117116 117112 fd06d4 28 API calls 117111->117112 117112->117104 117117 fc5c80 117113->117117 117116->117110 117118 fc5c8d 117117->117118 117119 fc5c71 117117->117119 117118->117119 117120 fc5c94 RegOpenKeyExW 117118->117120 117119->117110 117120->117119 117121 fc5cae RegQueryValueExW 117120->117121 117122 fc5ce4 RegCloseKey 117121->117122 117123 fc5ccf 117121->117123 117122->117119 117123->117122 117124 123d629 117125 123d651 117124->117125 117126 123d63e 117124->117126 117128 123d672 117125->117128 117129 123d668 RtlEnterCriticalSection 117125->117129 117153 123c845 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 117126->117153 117140 123d425 13 API calls 117128->117140 117129->117128 117130 123d643 117130->117125 117132 123d647 117130->117132 117133 123d67b 117134 123d67f 117133->117134 117141 123d0a1 117133->117141 117136 123d6e1 117134->117136 117137 123d6d7 RtlLeaveCriticalSection 117134->117137 117137->117136 117138 123d68b 117138->117134 117154 123d24d 9 API calls 117138->117154 117140->117133 117142 123d0b3 117141->117142 117143 123d0bc 117141->117143 117161 123c845 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 117142->117161 117146 123d0e5 RtlEnterCriticalSection 117143->117146 117147 123d0ef 117143->117147 117152 123d0c4 117143->117152 117145 123d0b8 117145->117143 117145->117152 117146->117147 117147->117152 117155 123cf59 117147->117155 117150 123d232 RtlLeaveCriticalSection 117151 123d23c 117150->117151 117151->117138 117152->117138 117153->117130 117154->117134 117159 123cf70 117155->117159 117156 123cfb1 117160 123cfd8 117156->117160 117167 123ccf1 117156->117167 117159->117156 117159->117160 117162 123cec1 117159->117162 117160->117150 117160->117151 117161->117145 117171 123c5c5 117162->117171 117164 123ced1 117165 123cede 117164->117165 117180 123ce35 9 API calls 117164->117180 117165->117159 117168 123cd8c 117167->117168 117169 123cd16 117167->117169 117168->117169 117199 123cc35 117168->117199 117169->117160 117175 123c5e3 117171->117175 117173 123c5f1 117181 123c449 117173->117181 117175->117173 117177 123c5ff 117175->117177 117178 123c651 117175->117178 117185 123c2a5 117175->117185 117193 123c159 LocalAlloc 117175->117193 117177->117164 117194 123c381 117178->117194 117180->117165 117182 123c49c 117181->117182 117183 123c4d2 VirtualAlloc 117182->117183 117184 123c4eb 117182->117184 117183->117182 117183->117184 117184->117177 117186 123c2b4 VirtualAlloc 117185->117186 117188 123c2e1 117186->117188 117189 123c304 117186->117189 117198 123c0c9 LocalAlloc 117188->117198 117189->117175 117191 123c2ed 117191->117189 117192 123c2f1 VirtualFree 117191->117192 117192->117189 117193->117175 117196 123c3af 117194->117196 117195 123c423 117195->117177 117196->117195 117197 123c3ed VirtualFree 117196->117197 117197->117196 117198->117191 117201 123cc49 117199->117201 117200 123cce5 117200->117169 117201->117200 117202 123cc81 117201->117202 117203 123cc97 117201->117203 117212 123c7b1 117202->117212 117205 123c7b1 3 API calls 117203->117205 117206 123cc95 117205->117206 117206->117200 117222 123caf5 9 API calls 117206->117222 117208 123ccb8 117209 123ccda 117208->117209 117223 123cb55 9 API calls 117208->117223 117224 123c1e1 LocalAlloc 117209->117224 117213 123c7db 117212->117213 117221 123c838 117212->117221 117225 123c509 117213->117225 117217 123c7fc 117218 123c381 VirtualFree 117217->117218 117220 123c813 117217->117220 117218->117220 117220->117221 117230 123c1e1 LocalAlloc 117220->117230 117221->117206 117222->117208 117223->117209 117224->117200 117227 123c55a 117225->117227 117226 123c5bb 117229 123c159 LocalAlloc 117226->117229 117227->117226 117228 123c58c VirtualFree 117227->117228 117228->117227 117229->117217 117230->117221 117231 fe8232 117236 fe7fee 117231->117236 117234 fe825a 117241 fe801f 117236->117241 117238 fe821e 117255 fe2610 25 API calls 117238->117255 117240 fe8173 117240->117234 117248 ff08ae 117240->117248 117244 fe8168 117241->117244 117251 fd8d2b 39 API calls 117241->117251 117243 fe81bc 117243->117244 117252 fd8d2b 39 API calls 117243->117252 117244->117240 117254 fe26cc 19 API calls 117244->117254 117246 fe81db 117246->117244 117253 fd8d2b 39 API calls 117246->117253 117256 feffab 117248->117256 117250 ff08c9 117250->117234 117251->117243 117252->117246 117253->117244 117254->117238 117255->117240 117259 feffb7 117256->117259 117257 feffc5 117314 fe26cc 19 API calls 117257->117314 117259->117257 117261 fefffe 117259->117261 117260 feffca 117315 fe2610 25 API calls 117260->117315 117267 ff0585 117261->117267 117266 feffd4 117266->117250 117317 ff0359 117267->117317 117270 ff05b7 117349 fe26b9 19 API calls 117270->117349 117271 ff05d0 117335 fe504f 117271->117335 117274 ff05d5 117276 ff05de 117274->117276 117277 ff05f5 117274->117277 117275 ff05bc 117350 fe26cc 19 API calls 117275->117350 117351 fe26b9 19 API calls 117276->117351 117348 ff02c4 CreateFileW 117277->117348 117281 ff05e3 117352 fe26cc 19 API calls 117281->117352 117283 ff06ab GetFileType 117284 ff06fd 117283->117284 117285 ff06b6 GetLastError 117283->117285 117357 fe4f98 20 API calls 117284->117357 117355 fe2696 19 API calls 117285->117355 117286 ff0680 GetLastError 117354 fe2696 19 API calls 117286->117354 117289 ff062e 117289->117283 117289->117286 117353 ff02c4 CreateFileW 117289->117353 117290 ff06c4 CloseHandle 117290->117275 117292 ff06ed 117290->117292 117356 fe26cc 19 API calls 117292->117356 117294 ff0673 117294->117283 117294->117286 117295 ff071e 117300 ff076a 117295->117300 117358 ff04d5 71 API calls 117295->117358 117297 ff06f2 117297->117275 117302 ff0797 117300->117302 117359 ff0077 71 API calls 117300->117359 117301 ff0790 117301->117302 117303 ff07a8 117301->117303 117360 fe84de 117302->117360 117305 ff0022 117303->117305 117306 ff0826 CloseHandle 117303->117306 117316 ff004b LeaveCriticalSection 117305->117316 117375 ff02c4 CreateFileW 117306->117375 117314->117260 117315->117266 117316->117266 117318 ff037a 117317->117318 117323 ff0394 117317->117323 117318->117323 117385 fe26cc 19 API calls 117318->117385 117321 ff0389 117386 fe2610 25 API calls 117321->117386 117378 ff02e9 117323->117378 117324 ff03fb 117333 ff044e 117324->117333 117389 fdd5ad 25 API calls 117324->117389 117325 ff03cc 117325->117324 117387 fe26cc 19 API calls 117325->117387 117328 ff0449 117330 ff04c8 117328->117330 117328->117333 117329 ff03f0 117388 fe2610 25 API calls 117329->117388 117390 fe2620 11 API calls 117330->117390 117333->117270 117333->117271 117334 ff04d4 117336 fe505b 117335->117336 117393 fe2e35 EnterCriticalSection 117336->117393 117338 fe5062 117339 fe50a9 117338->117339 117341 fe5087 117338->117341 117345 fe50f5 EnterCriticalSection 117338->117345 117394 fe5158 117339->117394 117397 fe4e2c 117341->117397 117342 fe50d2 117342->117274 117345->117339 117347 fe5102 LeaveCriticalSection 117345->117347 117347->117338 117348->117289 117349->117275 117350->117305 117351->117281 117352->117275 117353->117294 117354->117275 117355->117290 117356->117297 117357->117295 117358->117300 117359->117301 117422 fe51f2 117360->117422 117381 ff0301 117378->117381 117379 ff031c 117379->117325 117381->117379 117391 fe26cc 19 API calls 117381->117391 117382 ff0340 117392 fe2610 25 API calls 117382->117392 117384 ff034b 117384->117325 117385->117321 117386->117323 117387->117329 117388->117324 117389->117328 117390->117334 117391->117382 117392->117384 117393->117338 117405 fe2e7d LeaveCriticalSection 117394->117405 117396 fe515f 117396->117342 117406 fe287c 117397->117406 117399 fe4e4b 117414 fe27f4 117399->117414 117400 fe4e3e 117400->117399 117413 fe32dc 11 API calls 117400->117413 117404 fe4f73 EnterCriticalSection 117404->117339 117405->117396 117407 fe2889 117406->117407 117408 fe28c9 117407->117408 117409 fe28b4 RtlAllocateHeap 117407->117409 117419 fd4dd8 7 API calls 117407->117419 117420 fe26cc 19 API calls 117408->117420 117409->117407 117411 fe28c7 117409->117411 117411->117400 117413->117400 117415 fe27ff RtlFreeHeap 117414->117415 117416 fe282c 117414->117416 117415->117416 117417 fe2814 117415->117417 117416->117339 117416->117404 117421 fe26cc 19 API calls 117417->117421 117419->117407 117420->117411 117421->117416 117423 fe51ff 117422->117423 117424 fe5214 117422->117424 117437 fe26b9 19 API calls 117423->117437 117428 fe5239 117424->117428 117439 fe26b9 19 API calls 117424->117439 118819 ff3e53 118820 ff3e5d 118819->118820 118822 fb381e 118819->118822 118851 fb29d0 21 API calls 118820->118851 118830 fb38bc 118822->118830 118852 fd0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 118822->118852 118823 fb3e3d 118855 1024358 81 API calls 118823->118855 118826 ff3fc6 118827 fbf38f 21 API calls 118826->118827 118826->118830 118829 ff3fe0 118827->118829 118828 ff42b9 118856 1024358 81 API calls 118828->118856 118853 fd06d4 28 API calls 118829->118853 118830->118823 118834 fb3af2 118830->118834 118833 ff3fea 118854 fd080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 118833->118854 118834->118828 118838 fb3713 118834->118838 118835 ff4310 118837 fb376c 118839 ff43c4 118837->118839 118850 fb37a6 118837->118850 118838->118837 118844 fb3c35 118838->118844 118857 1024358 81 API calls 118839->118857 118840 fb415b 118843 fd042b 21 API calls 118840->118843 118841 fb4887 118846 ff3cef 118841->118846 118847 fb37bc 118841->118847 118841->118850 118843->118850 118844->118840 118844->118841 118844->118850 118845 ff43d3 118846->118847 118849 fbfbc8 21 API calls 118846->118849 118848 fbfbc8 21 API calls 118848->118850 118849->118847 118850->118847 118850->118848 118851->118822 118852->118826 118853->118833 118854->118830 118855->118828 118856->118835 118857->118845 117442 ff96f0 117443 ff96fb 117442->117443 117479 fba791 117442->117479 117443->117443 117444 fd045b 21 API calls 117444->117479 117445 fbaa25 timeGetTime 117445->117479 117446 fbab8d Sleep 117449 fbab9e 117446->117449 117459 fbaba9 117446->117459 117447 fd042b 21 API calls 117447->117479 117448 ffa622 Sleep 117450 ffa63e 117448->117450 117451 ffa633 117448->117451 117566 fcfb90 timeGetTime 117449->117566 117456 ffa689 117450->117456 117498 fba9d3 117450->117498 117587 101e2ab 45 API calls 117450->117587 117586 fcfb90 timeGetTime 117451->117586 117452 ff986e timeGetTime 117567 fb362b 22 API calls 117452->117567 117465 ffa6b9 GetExitCodeProcess 117456->117465 117471 ffa6ff 117456->117471 117456->117498 117458 ff9a6e Sleep 117458->117498 117463 ffa50a 117459->117463 117464 ffa501 117459->117464 117473 fbac34 117459->117473 117475 ffa508 117459->117475 117459->117498 117583 10432dd GetForegroundWindow 117463->117583 117582 10432dd GetForegroundWindow 117464->117582 117468 ffa6cf WaitForSingleObject 117465->117468 117469 ffa6e5 CloseHandle 117465->117469 117468->117469 117468->117498 117469->117471 117472 ffa740 Sleep 117471->117472 117472->117498 117473->117498 117475->117473 117476 ffa5f5 117475->117476 117475->117498 117584 10104cb 21 API calls 117475->117584 117585 101f7f5 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 117476->117585 117479->117444 117479->117445 117479->117446 117479->117447 117479->117448 117479->117452 117479->117458 117480 ff991a 117479->117480 117487 fbaad7 117479->117487 117490 ff971d TranslateAcceleratorW 117479->117490 117496 fbab6f TranslateMessage DispatchMessageW 117479->117496 117479->117498 117504 fb7d70 117479->117504 117511 fb7ff0 117479->117511 117532 fb8e00 117479->117532 117561 fc59e7 117479->117561 117568 1024636 21 API calls 117479->117568 117569 10434d5 21 API calls 117479->117569 117570 fb362b 22 API calls 117479->117570 117571 fbfa3b 117480->117571 117581 1024358 81 API calls 117487->117581 117489 ff996b 117492 fbfa3b 21 API calls 117489->117492 117490->117479 117491 ff9736 117490->117491 117494 ff99ad 117492->117494 117578 fb21b0 39 API calls 117494->117578 117496->117479 117497 ff99c9 117499 fbfa3b 21 API calls 117497->117499 117500 ff9a0b 117499->117500 117579 fb21b0 39 API calls 117500->117579 117502 ff9a27 117580 1024636 21 API calls 117502->117580 117505 fb7d8f 117504->117505 117506 fb7da3 117504->117506 117588 fb7870 93 API calls 117505->117588 117589 1024358 81 API calls 117506->117589 117508 fb7d9a 117508->117479 117510 ff7c61 117510->117510 117512 fb8030 117511->117512 117528 fb80fc 117512->117528 117595 fd0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 117512->117595 117515 ff7cb6 117518 fbf38f 21 API calls 117515->117518 117515->117528 117516 fb8401 117516->117479 117517 fbf38f 21 API calls 117517->117528 117520 ff7cd0 117518->117520 117596 fd06d4 28 API calls 117520->117596 117524 ff7cda 117597 fd080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 117524->117597 117527 fbfbc8 21 API calls 117527->117528 117528->117516 117528->117517 117528->117527 117529 fb2510 21 API calls 117528->117529 117530 1024358 81 API calls 117528->117530 117590 fb1d83 117528->117590 117594 fb6394 92 API calls 117528->117594 117598 fd0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 117528->117598 117599 fd06d4 28 API calls 117528->117599 117600 fd080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 117528->117600 117601 1037497 93 API calls 117528->117601 117529->117528 117530->117528 117533 fb908a 117532->117533 117551 fb8e62 117532->117551 117652 fd0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 117533->117652 117535 fb8e6e 117603 fc5eb0 117535->117603 117536 ff8b44 117654 1037c74 165 API calls 117536->117654 117538 fb9094 117541 fbfa3b 21 API calls 117538->117541 117538->117551 117544 fb90b2 117541->117544 117543 fb8e9f 117545 fc5eb0 9 API calls 117543->117545 117556 fb903a 117543->117556 117653 fd080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 117544->117653 117546 fb8eb3 117545->117546 117547 ff8b54 117546->117547 117549 fc5eb0 9 API calls 117546->117549 117547->117556 117655 1024358 81 API calls 117547->117655 117552 fb8ecc 117549->117552 117551->117535 117551->117536 117552->117547 117553 fb8f5d 117552->117553 117554 fc5eb0 9 API calls 117553->117554 117555 fb8f70 117554->117555 117626 fbc263 117555->117626 117644 102fc5b 117555->117644 117556->117479 117558 fb8f8c 117558->117556 117651 fb29d0 21 API calls 117558->117651 117562 fc5a2b 117561->117562 117564 fc59f9 117561->117564 117562->117479 117563 fc5a1e IsDialogMessageW 117563->117562 117563->117564 117564->117562 117564->117563 117565 1009c70 GetClassLongW 117564->117565 117565->117563 117565->117564 117566->117459 117567->117479 117568->117479 117569->117479 117570->117479 117572 fbfa4a 117571->117572 117573 fd045b 21 API calls 117572->117573 117574 fbfa72 117573->117574 117575 fd042b 21 API calls 117574->117575 117576 fbfa88 117575->117576 117577 fb21b0 39 API calls 117576->117577 117577->117489 117578->117497 117579->117502 117580->117498 117581->117498 117582->117475 117583->117475 117584->117476 117585->117473 117586->117450 117587->117456 117588->117508 117589->117510 117591 fb1d8e 117590->117591 117592 fb1dbd 117591->117592 117602 fb21b0 39 API calls 117591->117602 117592->117528 117594->117528 117595->117515 117596->117524 117597->117528 117598->117528 117599->117528 117600->117528 117601->117528 117602->117592 117604 fc5edd 117603->117604 117605 fb8e7a 117603->117605 117656 fd0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 117604->117656 117609 fb8c60 117605->117609 117607 fc5ee7 117607->117605 117657 fd080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 117607->117657 117610 ff8a9a 117609->117610 117613 fb8c8c 117609->117613 117611 ff8aab 117610->117611 117659 1024358 81 API calls 117610->117659 117611->117543 117614 ff8abf 117613->117614 117620 fb8cca 117613->117620 117660 1024358 81 API calls 117614->117660 117617 fd042b 21 API calls 117617->117620 117618 fd045b 21 API calls 117618->117620 117619 ff8b03 117661 fb914c 93 API calls 117619->117661 117620->117617 117620->117618 117620->117619 117622 ff8b19 117620->117622 117623 fb8dac 117620->117623 117624 fb8d99 117620->117624 117622->117623 117662 1024358 81 API calls 117622->117662 117623->117543 117624->117623 117658 103630a 53 API calls 117624->117658 117627 fbc296 117626->117627 117643 fbc333 117626->117643 117628 fbc2a6 117627->117628 117714 fb334c 117627->117714 117630 fbc2b9 117628->117630 117631 fb334c 38 API calls 117628->117631 117632 fbc2cc 117630->117632 117634 fb334c 38 API calls 117630->117634 117631->117630 117633 fbc2df 117632->117633 117635 fb334c 38 API calls 117632->117635 117636 fbc2f2 117633->117636 117637 fb334c 38 API calls 117633->117637 117634->117632 117635->117633 117638 fbc305 117636->117638 117639 fb334c 38 API calls 117636->117639 117637->117636 117663 fb304c 117638->117663 117639->117638 117643->117558 117645 fb304c 52 API calls 117644->117645 117646 102fc95 117645->117646 117760 fbfe70 117646->117760 117648 102fca5 117650 102fcce 117648->117650 117788 fb32c3 117648->117788 117650->117558 117651->117558 117652->117538 117653->117551 117654->117547 117655->117556 117656->117607 117657->117605 117658->117623 117659->117611 117660->117623 117661->117622 117662->117623 117664 fb3063 117663->117664 117681 fb305e 117663->117681 117665 fb306b 117664->117665 117666 fb3099 117664->117666 117718 fd50f1 25 API calls 117665->117718 117667 ff2e83 117666->117667 117669 fb30ab 117666->117669 117678 ff2d8c 117666->117678 117721 fd50ae 25 API calls 117667->117721 117719 fd016e 50 API calls 117669->117719 117670 fb307b 117674 fd042b 21 API calls 117670->117674 117672 ff2e9b 117672->117672 117677 fb3085 117674->117677 117675 ff2e05 117720 fd016e 50 API calls 117675->117720 117679 fbfa3b 21 API calls 117677->117679 117678->117675 117680 fd045b 21 API calls 117678->117680 117679->117681 117682 ff2dd5 117680->117682 117686 fc51fb 117681->117686 117683 fd042b 21 API calls 117682->117683 117684 ff2dfc 117683->117684 117685 fbfa3b 21 API calls 117684->117685 117685->117675 117687 fd042b 21 API calls 117686->117687 117688 fc520e 117687->117688 117722 fc5d68 117688->117722 117692 fc5240 117694 fc5435 117692->117694 117695 fc52c8 SystemParametersInfoW GetSystemMetrics 117692->117695 117696 fc52f5 117692->117696 117699 1008df5 GetWindowRect GetClientRect GetSystemMetrics GetSystemMetrics 117694->117699 117700 1008dbb 117694->117700 117713 fc5441 117694->117713 117751 fc4e5a 117694->117751 117695->117696 117697 fc52fb SystemParametersInfoW GetSystemMetrics 117696->117697 117698 fc5341 SetRect AdjustWindowRectEx CreateWindowExW 117696->117698 117697->117698 117701 fc5330 GetSystemMetrics 117697->117701 117698->117694 117702 fc53a2 SetWindowLongW GetClientRect GetStockObject SendMessageW 117698->117702 117699->117700 117703 1008e47 GetSystemMetrics 117699->117703 117700->117694 117705 1008e7e 117700->117705 117750 1048251 GetWindowLongW DestroyWindow 117700->117750 117701->117698 117729 fc4b74 GetCursorPos ScreenToClient 117702->117729 117703->117700 117754 fc544c 39 API calls 117705->117754 117713->117643 117715 fb335d 117714->117715 117716 fb3364 117714->117716 117715->117716 117759 fd61fc 38 API calls 117715->117759 117716->117628 117718->117670 117719->117670 117720->117667 117721->117672 117723 fbf38f 21 API calls 117722->117723 117724 fc5d95 117723->117724 117725 fbf38f 21 API calls 117724->117725 117726 fc5dc3 117725->117726 117727 fbf38f 21 API calls 117726->117727 117728 fc5216 117726->117728 117727->117726 117728->117692 117743 fc2960 117728->117743 117744 fc2972 117743->117744 117748 fc2991 117743->117748 117746 fd045b 21 API calls 117744->117746 117745 fd042b 21 API calls 117747 fc29a8 117745->117747 117746->117748 117747->117692 117748->117745 117750->117694 117752 fc4e68 GetWindowLongW 117751->117752 117753 fc4e76 117751->117753 117752->117753 117753->117694 117759->117716 117761 fbf6d1 21 API calls 117760->117761 117764 fbfe95 117761->117764 117762 fc00bb 117804 fc1323 21 API calls 117762->117804 117764->117762 117768 100664c 117764->117768 117771 fc04cd 117764->117771 117772 fc1323 21 API calls 117764->117772 117775 fbf9fa 21 API calls 117764->117775 117777 1006467 117764->117777 117783 fbfaa1 21 API calls 117764->117783 117785 fd045b 21 API calls 117764->117785 117787 100657a 117764->117787 117802 fc20c0 40 API calls 117764->117802 117805 fbfcc7 22 API calls 117764->117805 117806 fbf5c0 21 API calls 117764->117806 117807 fc146a 21 API calls 117764->117807 117766 fc00d5 117766->117648 117808 101a4b0 83 API calls 117768->117808 117771->117766 117810 101a4b0 83 API calls 117771->117810 117772->117764 117773 100665a 117809 fc1323 21 API calls 117773->117809 117775->117764 117776 fd042b 21 API calls 117778 100653d 117776->117778 117777->117776 117781 fd045b 21 API calls 117778->117781 117780 1006670 117780->117766 117781->117787 117784 fc0089 CharUpperBuffW 117783->117784 117803 fc146a 21 API calls 117784->117803 117785->117764 117787->117768 117787->117771 117789 ff304d 117788->117789 117790 fb32d3 117788->117790 117791 ff305e 117789->117791 117792 fbf82c 21 API calls 117789->117792 117795 fd042b 21 API calls 117790->117795 117811 fbf9fa 117791->117811 117792->117791 117794 ff3068 117794->117794 117796 fb32e6 117795->117796 117797 fb32ef 117796->117797 117798 fb3301 117796->117798 117799 fbfa3b 21 API calls 117797->117799 117800 fbf38f 21 API calls 117798->117800 117801 fb32f7 117799->117801 117800->117801 117801->117650 117802->117764 117803->117764 117804->117766 117805->117764 117806->117764 117807->117764 117808->117773 117809->117780 117810->117766 117812 fbfa14 117811->117812 117816 fbfa07 117811->117816 117813 fd042b 21 API calls 117812->117813 117814 fbfa1e 117813->117814 117815 fd045b 21 API calls 117814->117815 117815->117816 117816->117794 118858 fd0a12 118859 fd0a1e 118858->118859 118888 fd04e7 118859->118888 118861 fd0a25 118862 fd0b6d 118861->118862 118865 fd0a4f 118861->118865 118926 fd0e4d IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 118862->118926 118864 fd0b74 118927 fd4d5e 27 API calls 118864->118927 118877 fd0a8e 118865->118877 118899 fe22a1 118865->118899 118867 fd0b7a 118928 fd4d10 27 API calls 118867->118928 118871 fd0b82 118873 fd0a6e 118874 fd0aee 118907 fd0f69 118874->118907 118876 fd0af4 118911 fcfc28 118876->118911 118877->118874 118922 fd4d26 37 API calls 118877->118922 118882 fd0b10 118882->118864 118884 fd0b14 118882->118884 118883 fd0b1d 118925 fd0671 13 API calls 118883->118925 118884->118883 118924 fd4d01 27 API calls 118884->118924 118887 fd0b25 118887->118873 118889 fd04f0 118888->118889 118929 fd0ca4 IsProcessorFeaturePresent 118889->118929 118891 fd04fc 118930 fd3ed4 10 API calls 118891->118930 118893 fd0501 118894 fd0505 118893->118894 118931 fe213b 118893->118931 118894->118861 118897 fd051c 118897->118861 118900 fe22b8 118899->118900 118901 fd11dd 5 API calls 118900->118901 118902 fd0a68 118901->118902 118902->118873 118903 fe2245 118902->118903 118904 fe2274 118903->118904 118905 fd11dd 5 API calls 118904->118905 118906 fe229d 118905->118906 118906->118877 118982 fd3580 118907->118982 118910 fd0f8f 118910->118876 118912 fcfc34 IsThemeActive 118911->118912 118914 fcfc8f 118911->118914 118984 fd4e6e 118912->118984 118923 fd4c35 GetModuleHandleW 118914->118923 118915 fcfc5f 118990 fd4ed4 118915->118990 118917 fcfc66 118997 fcfc98 SystemParametersInfoW SystemParametersInfoW 118917->118997 118919 fcfc6d 118998 fc2d33 118919->118998 118922->118874 118923->118882 118924->118883 118925->118887 118926->118864 118927->118867 118928->118871 118929->118891 118930->118893 118935 fed026 118931->118935 118934 fd3efd 8 API calls 118934->118894 118938 fed043 118935->118938 118939 fed03f 118935->118939 118937 fd050e 118937->118897 118937->118934 118938->118939 118941 fe4a84 118938->118941 118953 fd11dd 118939->118953 118942 fe4a90 118941->118942 118960 fe2e35 EnterCriticalSection 118942->118960 118944 fe4a97 118961 fe4edb 118944->118961 118946 fe4aa6 118952 fe4ab5 118946->118952 118974 fe4918 28 API calls 118946->118974 118949 fe4ac6 118949->118938 118950 fe4ab0 118975 fe49ce GetStdHandle GetFileType 118950->118975 118976 fe4ad1 LeaveCriticalSection 118952->118976 118954 fd11e8 IsProcessorFeaturePresent 118953->118954 118955 fd11e6 118953->118955 118957 fd122a 118954->118957 118955->118937 118981 fd11ee SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 118957->118981 118959 fd130d 118959->118937 118960->118944 118962 fe4ee7 118961->118962 118963 fe4f0b 118962->118963 118964 fe4ef4 118962->118964 118977 fe2e35 EnterCriticalSection 118963->118977 118978 fe26cc 19 API calls 118964->118978 118967 fe4ef9 118979 fe2610 25 API calls 118967->118979 118969 fe4f03 118969->118946 118970 fe4f43 118980 fe4f6a LeaveCriticalSection 118970->118980 118972 fe4f17 118972->118970 118973 fe4e2c 20 API calls 118972->118973 118973->118972 118974->118950 118975->118952 118976->118949 118977->118972 118978->118967 118979->118969 118980->118969 118981->118959 118983 fd0f7c GetStartupInfoW 118982->118983 118983->118910 118985 fd4e7a 118984->118985 119047 fe2e35 EnterCriticalSection 118985->119047 118987 fd4e85 119048 fd4ec5 118987->119048 118989 fd4eba 118989->118915 118991 fd4efa 118990->118991 118992 fd4ee0 118990->118992 118991->118917 118992->118991 119052 fe26cc 19 API calls 118992->119052 118994 fd4eea 119053 fe2610 25 API calls 118994->119053 118996 fd4ef5 118996->118917 118997->118919 118999 fc2d43 118998->118999 119000 fbf38f 21 API calls 118999->119000 119001 fc2d4f GetCurrentDirectoryW 119000->119001 119054 fc2a5e 119001->119054 119047->118987 119051 fe2e7d LeaveCriticalSection 119048->119051 119050 fd4ecc 119050->118989 119051->119050 119052->118994 119053->118996 119055 fbf38f 21 API calls 119054->119055 119056 fc2a74 119055->119056 119162 fc2f4b 119056->119162 119163 fc2f58 119162->119163 117817 ff362f 117858 fb42e9 117817->117858 117818 fb469e 117821 fb3713 117818->117821 117855 fb46c6 117818->117855 117820 ff4310 117822 fb376c 117821->117822 117827 fb3c35 117821->117827 117823 ff43c4 117822->117823 117839 fb37a6 117822->117839 118012 1024358 81 API calls 117823->118012 117824 fbfbc8 21 API calls 117824->117858 117825 fb415b 117829 fd042b 21 API calls 117825->117829 117826 fb4887 117834 ff3cef 117826->117834 117836 fb37bc 117826->117836 117826->117839 117827->117825 117827->117826 117827->117839 117829->117839 117830 ff43d3 117834->117836 117838 fbfbc8 21 API calls 117834->117838 117837 fbfbc8 21 API calls 117837->117839 117838->117836 117839->117836 117839->117837 117840 fbfa3b 21 API calls 117840->117858 117844 ff41a4 118006 1024358 81 API calls 117844->118006 117847 ff41b7 118010 100ff7d 21 API calls 117847->118010 117848 fd042b 21 API calls 117848->117858 117849 ff41c5 118007 1024358 81 API calls 117849->118007 117850 fd045b 21 API calls 117850->117858 117852 fc5eb0 9 API calls 117852->117858 117853 ff41d7 118008 100ff7d 21 API calls 117853->118008 118011 1024358 81 API calls 117855->118011 117857 ff35b9 118009 1024358 81 API calls 117857->118009 117858->117818 117858->117824 117858->117840 117858->117844 117858->117847 117858->117848 117858->117849 117858->117850 117858->117852 117858->117855 117858->117857 117864 102fc5b 85 API calls 117858->117864 117866 103a943 117858->117866 117874 fc174b 117858->117874 117878 103a545 117858->117878 117884 fbbfa2 117858->117884 117941 1039f7b 117858->117941 117944 1027efb 117858->117944 117999 fb3574 21 API calls 117858->117999 118000 fb914c 93 API calls 117858->118000 118001 1021e7c 21 API calls 117858->118001 118002 fd0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 117858->118002 118003 fd080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 117858->118003 118004 1037c74 165 API calls 117858->118004 118005 100ff7d 21 API calls 117858->118005 117864->117858 117867 103a99f 117866->117867 117873 103a95f 117866->117873 117868 fb334c 38 API calls 117867->117868 117869 103a9bf 117867->117869 117868->117869 117870 fb334c 38 API calls 117869->117870 117871 103aa27 117869->117871 117869->117873 117870->117871 118013 1020815 117871->118013 117873->117858 117875 fc1754 117874->117875 117876 fc1761 117874->117876 118092 fc1cf6 117875->118092 117876->117858 117879 103a558 117878->117879 117880 fb304c 52 API calls 117879->117880 117883 103a567 117879->117883 117881 103a5c5 117880->117881 118098 1021c68 117881->118098 117883->117858 117885 fb32c3 21 API calls 117884->117885 117886 fbbfba 117885->117886 117887 fd042b 21 API calls 117886->117887 117889 ffb542 117886->117889 117890 fbbfd3 117887->117890 117893 fbc04c 117889->117893 118164 102a7ef 38 API calls 117889->118164 117891 fd045b 21 API calls 117890->117891 117892 fbbfe4 117891->117892 118145 fc1ebe 117892->118145 117895 fb334c 38 API calls 117893->117895 117900 fbc059 117893->117900 117898 ffb5a4 117895->117898 117897 fbf38f 21 API calls 117899 fbbff7 117897->117899 117898->117900 117901 ffb5ac 117898->117901 117903 fc1ebe CloseHandle 117899->117903 118158 fc1dcc SetFilePointerEx SetFilePointerEx SetFilePointerEx 117900->118158 117904 fb334c 38 API calls 117901->117904 117905 fbbffe 117903->117905 117908 fbc060 117904->117908 117906 fb304c 52 API calls 117905->117906 117907 fbc00a 117906->117907 117909 fc1ebe CloseHandle 117907->117909 117911 fbc07a 117908->117911 117912 ffb5c1 117908->117912 117910 fbc014 117909->117910 118149 fc1ee8 117910->118149 117913 fbf38f 21 API calls 117911->117913 117915 fd045b 21 API calls 117912->117915 117918 fbc082 117913->117918 117917 ffb5c7 117915->117917 117922 ffb5db 117917->117922 118142 fc1762 117917->118142 118159 fc1af9 27 API calls 117918->118159 117920 ffb53a 118163 fc17cc CloseHandle 117920->118163 117921 fbc02d 118157 fc1bb6 26 API calls 117921->118157 117924 1021c03 21 API calls 117922->117924 117930 ffb5df 117922->117930 117924->117930 117926 fbc091 117926->117930 118160 fb326c 21 API calls 117926->118160 117929 fbc03b 117931 fc174b 3 API calls 117929->117931 117934 fbc042 117931->117934 117932 fbc0a5 117933 fbc0df 117932->117933 117936 fc1ebe CloseHandle 117932->117936 117933->117858 117934->117893 117935 ffb503 117934->117935 118162 101daab SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 117935->118162 117938 fbc0d3 117936->117938 117938->117933 118161 fc17cc CloseHandle 117938->118161 117939 ffb51a 117939->117893 118170 1038974 117941->118170 117943 1039f8b 117943->117858 117945 1027f1a 117944->117945 117947 1027f25 117944->117947 117946 fb334c 38 API calls 117945->117946 117946->117947 117949 fbf38f 21 API calls 117947->117949 117987 102800b 117947->117987 117948 fd042b 21 API calls 117950 102803e 117948->117950 117951 1027f46 117949->117951 117952 fd045b 21 API calls 117950->117952 117953 fbf38f 21 API calls 117951->117953 117954 102804f 117952->117954 117956 1027f4f 117953->117956 117955 fc1ebe CloseHandle 117954->117955 117957 102805a 117955->117957 117958 fb304c 52 API calls 117956->117958 117959 fbf38f 21 API calls 117957->117959 117960 1027f5b 117958->117960 117961 1028062 117959->117961 118282 fb11ef 21 API calls 117960->118282 117963 fc1ebe CloseHandle 117961->117963 117966 1028069 117963->117966 117964 1027f70 117965 fbf78e 21 API calls 117964->117965 117967 1027fa3 117965->117967 117968 fb304c 52 API calls 117966->117968 117969 1028001 117967->117969 117970 1027faa 117967->117970 117971 1028075 117968->117971 117974 fb334c 38 API calls 117969->117974 118283 101e9ba GetFileAttributesW FindFirstFileW FindClose 117970->118283 117973 fc1ebe CloseHandle 117971->117973 117976 102807f 117973->117976 117974->117987 117975 1027fb3 117975->117969 117977 fbfa3b 21 API calls 117975->117977 117978 fc1ee8 5 API calls 117976->117978 117979 1027fca 117977->117979 117980 1028099 117978->117980 118284 101e098 25 API calls 117979->118284 117982 10280a1 117980->117982 117983 1028195 GetLastError 117980->117983 118285 fc1bb6 26 API calls 117982->118285 117984 10281ae 117983->117984 118287 fc17cc CloseHandle 117984->118287 117987->117948 117998 102813d 117987->117998 117988 10280af 117990 fc174b 3 API calls 117988->117990 117989 1027fd3 117989->117969 117994 10280b6 117990->117994 117991 10280fc 117992 fd042b 21 API calls 117991->117992 117995 1028130 117992->117995 117993 10280d0 118286 101daab SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 117993->118286 117994->117991 117994->117993 117996 fbf38f 21 API calls 117995->117996 117996->117998 117998->117858 117999->117858 118000->117858 118001->117858 118002->117858 118003->117858 118004->117858 118005->117858 118006->117847 118007->117853 118008->117855 118009->117847 118010->117855 118011->117820 118012->117830 118046 102074d 52 API calls 118013->118046 118015 1020834 118016 1020896 118015->118016 118017 10208ae 118015->118017 118039 102083a 118015->118039 118047 1020a92 56 API calls 118016->118047 118019 1020921 118017->118019 118022 1020918 118017->118022 118028 10208cb 118017->118028 118020 1020953 118019->118020 118021 10209b9 118019->118021 118019->118039 118024 1020983 118020->118024 118025 1020958 118020->118025 118026 10209c2 118021->118026 118027 1020a59 118021->118027 118022->118019 118023 10208ff 118022->118023 118052 1021c03 118023->118052 118024->118039 118062 fb33b0 38 API calls 118024->118062 118025->118039 118061 fb33b0 38 API calls 118025->118061 118029 10209c7 118026->118029 118030 1020a38 118026->118030 118027->118039 118066 fb3400 38 API calls 118027->118066 118048 1022bf2 118028->118048 118032 1020a06 118029->118032 118033 10209cd 118029->118033 118030->118039 118065 fb3400 38 API calls 118030->118065 118032->118039 118064 fb3400 38 API calls 118032->118064 118033->118039 118063 fb3400 38 API calls 118033->118063 118039->117873 118041 10208d3 118043 1022bf2 23 API calls 118041->118043 118044 10208ea 118043->118044 118045 1022bf2 23 API calls 118044->118045 118045->118023 118046->118015 118047->118039 118049 1022c00 118048->118049 118050 1022bfb 118048->118050 118049->118041 118067 1021ce5 118050->118067 118053 1021c0e 118052->118053 118054 fd042b 21 API calls 118053->118054 118055 1021c15 118054->118055 118056 1021c42 118055->118056 118057 1021c21 118055->118057 118059 fd045b 21 API calls 118056->118059 118058 fd045b 21 API calls 118057->118058 118060 1021c2a 118058->118060 118059->118060 118060->118039 118061->118039 118062->118039 118063->118039 118064->118039 118065->118039 118066->118039 118068 1021cfc 118067->118068 118083 1021e15 118067->118083 118069 1021d1c 118068->118069 118070 1021d49 118068->118070 118072 1021d60 118068->118072 118069->118070 118073 1021d30 118069->118073 118071 fd045b 21 API calls 118070->118071 118085 1021d3e 118071->118085 118075 fd045b 21 API calls 118072->118075 118081 1021d7d 118072->118081 118076 fd045b 21 API calls 118073->118076 118074 1021da4 118077 fd045b 21 API calls 118074->118077 118075->118081 118076->118085 118078 1021daa 118077->118078 118086 10219fa 118078->118086 118079 fd042b 21 API calls 118079->118083 118081->118073 118081->118074 118081->118085 118083->118049 118085->118079 118087 fd045b 21 API calls 118086->118087 118088 1021a11 118087->118088 118089 fd042b 21 API calls 118088->118089 118090 1021a1d 118089->118090 118091 fd00d3 23 API calls 118090->118091 118091->118085 118093 fc1d0d 118092->118093 118094 1007440 SetFilePointerEx 118093->118094 118095 fc1d96 SetFilePointerEx SetFilePointerEx 118093->118095 118096 100742f 118093->118096 118097 fc1d60 118093->118097 118095->118097 118096->118094 118097->117876 118099 1021c75 118098->118099 118100 fd042b 21 API calls 118099->118100 118101 1021c7c 118100->118101 118104 1020156 118101->118104 118103 1021cb6 118103->117883 118105 fbfaa1 21 API calls 118104->118105 118106 1020169 CharLowerBuffW 118105->118106 118109 102017c 118106->118109 118107 fbf6ad 21 API calls 118107->118109 118108 1020186 118108->118103 118109->118107 118109->118108 118110 10201ba 118109->118110 118113 10201cc 118110->118113 118137 fbf6ad 118110->118137 118112 fd045b 21 API calls 118117 10201fa 118112->118117 118113->118112 118116 1020259 118116->118108 118119 fd042b 21 API calls 118116->118119 118118 102021c 118117->118118 118140 102008e 21 API calls 118117->118140 118122 10202af 118118->118122 118120 1020273 118119->118120 118121 fd045b 21 API calls 118120->118121 118121->118108 118123 fbf38f 21 API calls 118122->118123 118124 10202e1 118123->118124 118125 fbf38f 21 API calls 118124->118125 118126 10202ea 118125->118126 118127 fbf38f 21 API calls 118126->118127 118135 10202f3 118127->118135 118128 10205b7 118128->118116 118129 fbf5c0 21 API calls 118129->118135 118130 fd62b3 GetStringTypeW 118130->118135 118131 fbf82c 21 API calls 118131->118135 118133 fd61fc 38 API calls 118133->118135 118134 10202af 40 API calls 118134->118135 118135->118128 118135->118129 118135->118130 118135->118131 118135->118133 118135->118134 118136 fbfbc8 21 API calls 118135->118136 118141 fd62dd GetStringTypeW 118135->118141 118136->118135 118138 fbfaa1 21 API calls 118137->118138 118139 fbf6b8 118138->118139 118139->118113 118140->118117 118141->118135 118165 fc1e10 118142->118165 118146 fbbfef 118145->118146 118147 fc1ed7 118145->118147 118146->117897 118147->118146 118148 fc1edc CloseHandle 118147->118148 118148->118146 118150 fc1eff CreateFileW 118149->118150 118151 1007466 118149->118151 118152 fbc025 118150->118152 118151->118152 118153 100746c CreateFileW 118151->118153 118152->117920 118152->117921 118153->118152 118154 1007494 118153->118154 118155 fc1cf6 3 API calls 118154->118155 118156 100749f 118155->118156 118156->118152 118157->117929 118158->117908 118159->117926 118160->117932 118161->117933 118162->117939 118163->117889 118164->117889 118166 fc1e8d SetFilePointerEx 118165->118166 118169 fc1e21 118165->118169 118166->118169 118167 fc1773 118167->117922 118168 fc1e5e ReadFile 118168->118167 118168->118169 118169->118167 118169->118168 118171 fb304c 52 API calls 118170->118171 118172 10389ab 118171->118172 118194 10389f0 118172->118194 118207 10396f4 118172->118207 118174 1038c9c 118175 1038e6a 118174->118175 118179 1038caa 118174->118179 118256 10398c8 59 API calls 118175->118256 118177 1038e79 118178 1038e85 118177->118178 118177->118179 118178->118194 118220 10388a1 118179->118220 118180 fb304c 52 API calls 118196 1038a64 118180->118196 118185 1038ce3 118235 fd02c0 118185->118235 118188 1038d03 118240 1024358 81 API calls 118188->118240 118189 1038d1d 118241 fb2b1f 118189->118241 118192 1038d0e GetCurrentProcess TerminateProcess 118192->118189 118194->117943 118196->118174 118196->118180 118196->118194 118239 1038f38 41 API calls 118196->118239 118199 1038ee0 118199->118194 118203 1038ef4 FreeLibrary 118199->118203 118200 1038d5c 118253 1039598 75 API calls 118200->118253 118203->118194 118205 1038d6d 118205->118199 118254 fb2510 21 API calls 118205->118254 118255 fb3574 21 API calls 118205->118255 118257 1039598 75 API calls 118205->118257 118208 fbfaa1 21 API calls 118207->118208 118209 1039711 CharLowerBuffW 118208->118209 118258 1019d33 118209->118258 118213 fbf38f 21 API calls 118214 103974d 118213->118214 118265 fbf4fe 21 API calls 118214->118265 118216 1039761 118217 fbf9a0 21 API calls 118216->118217 118219 103976b 118217->118219 118218 1039866 118218->118196 118219->118218 118266 1038f38 41 API calls 118219->118266 118221 10388bc 118220->118221 118225 1038907 118220->118225 118222 fd045b 21 API calls 118221->118222 118223 10388de 118222->118223 118224 fd042b 21 API calls 118223->118224 118223->118225 118224->118223 118226 1039a7c 118225->118226 118227 1039c95 118226->118227 118234 1039aa0 118226->118234 118227->118185 118228 fb334c 38 API calls 118228->118234 118229 fb3400 38 API calls 118229->118234 118230 fb33b0 38 API calls 118230->118234 118231 fb304c 52 API calls 118231->118234 118232 fde8ac 20 API calls 118232->118234 118234->118227 118234->118228 118234->118229 118234->118230 118234->118231 118234->118232 118269 101fe37 23 API calls 118234->118269 118237 fd02d5 118235->118237 118236 fd036d EnumWindows 118238 fd033b 118236->118238 118237->118236 118237->118238 118238->118188 118238->118189 118239->118196 118240->118192 118242 fb2b27 118241->118242 118243 fd042b 21 API calls 118242->118243 118244 fb2b35 118243->118244 118270 fb2a2a 118244->118270 118247 fb2830 118273 fb2940 118247->118273 118249 fd045b 21 API calls 118251 fb28d8 118249->118251 118250 fb2840 118250->118249 118250->118251 118251->118205 118252 fb2510 21 API calls 118251->118252 118252->118200 118253->118205 118254->118205 118255->118205 118256->118177 118257->118205 118260 1019d53 118258->118260 118259 1019d92 118259->118213 118259->118219 118260->118259 118261 1019d88 118260->118261 118262 1019e4a 118260->118262 118261->118259 118267 fbf577 40 API calls 118261->118267 118262->118259 118268 fbf577 40 API calls 118262->118268 118265->118216 118266->118218 118267->118261 118268->118262 118269->118234 118271 fd042b 21 API calls 118270->118271 118272 fb2a37 118271->118272 118272->118247 118274 fb294d 118273->118274 118275 ff29e7 118274->118275 118280 fb2957 118274->118280 118276 fd042b 21 API calls 118275->118276 118278 ff29f6 118276->118278 118277 fb295e 118277->118250 118280->118277 118281 fb3490 21 API calls 118280->118281 118281->118280 118282->117964 118283->117975 118284->117989 118285->117988 118286->117991 118287->117998 118288 ff872d 118292 100fed5 118288->118292 118290 ff8738 118291 100fed5 52 API calls 118290->118291 118291->118290 118293 100ff0f 118292->118293 118297 100fee2 118292->118297 118293->118290 118294 100ff11 118304 fb2b69 52 API calls 118294->118304 118295 100ff16 118298 fb304c 52 API calls 118295->118298 118297->118293 118297->118294 118297->118295 118301 100ff09 118297->118301 118299 100ff1d 118298->118299 118300 fbf78e 21 API calls 118299->118300 118300->118293 118303 fb2df0 38 API calls 118301->118303 118303->118293 118304->118295 118305 fc3aa8 GetForegroundWindow 118306 fc4e5a GetWindowLongW 118305->118306 118307 fc3abc 118306->118307 118308 fc3ad5 118307->118308 118309 fc4b74 26 API calls 118307->118309 118309->118308 118310 fe8f2a 118311 fe8f37 118310->118311 118314 fe8f4f 118310->118314 118367 fe26cc 19 API calls 118311->118367 118313 fe8f3c 118368 fe2610 25 API calls 118313->118368 118316 fe8faa 118314->118316 118324 fe8f47 118314->118324 118369 fefc75 20 API calls 118314->118369 118330 fdd7f5 118316->118330 118319 fe8fc2 118337 fe8a62 118319->118337 118321 fe8fc9 118322 fdd7f5 25 API calls 118321->118322 118321->118324 118323 fe8ff5 118322->118323 118323->118324 118325 fdd7f5 25 API calls 118323->118325 118326 fe9003 118325->118326 118326->118324 118327 fdd7f5 25 API calls 118326->118327 118328 fe9013 118327->118328 118329 fdd7f5 25 API calls 118328->118329 118329->118324 118331 fdd816 118330->118331 118332 fdd801 118330->118332 118331->118319 118370 fe26cc 19 API calls 118332->118370 118334 fdd806 118371 fe2610 25 API calls 118334->118371 118336 fdd811 118336->118319 118338 fe8a6e 118337->118338 118339 fe8a8e 118338->118339 118340 fe8a76 118338->118340 118341 fe8b54 118339->118341 118345 fe8ac7 118339->118345 118438 fe26b9 19 API calls 118340->118438 118445 fe26b9 19 API calls 118341->118445 118344 fe8a7b 118439 fe26cc 19 API calls 118344->118439 118348 fe8aeb 118345->118348 118349 fe8ad6 118345->118349 118346 fe8b59 118446 fe26cc 19 API calls 118346->118446 118372 fe4f73 EnterCriticalSection 118348->118372 118440 fe26b9 19 API calls 118349->118440 118351 fe8a83 118351->118321 118354 fe8adb 118441 fe26cc 19 API calls 118354->118441 118355 fe8af1 118357 fe8b0d 118355->118357 118358 fe8b22 118355->118358 118442 fe26cc 19 API calls 118357->118442 118373 fe8b75 118358->118373 118361 fe8ae3 118447 fe2610 25 API calls 118361->118447 118363 fe8b1d 118444 fe8b4c LeaveCriticalSection 118363->118444 118364 fe8b12 118443 fe26b9 19 API calls 118364->118443 118367->118313 118368->118324 118369->118316 118370->118334 118371->118336 118372->118355 118374 fe8b9f 118373->118374 118375 fe8b87 118373->118375 118377 fe8f09 118374->118377 118382 fe8be4 118374->118382 118457 fe26b9 19 API calls 118375->118457 118475 fe26b9 19 API calls 118377->118475 118378 fe8b8c 118458 fe26cc 19 API calls 118378->118458 118381 fe8f0e 118476 fe26cc 19 API calls 118381->118476 118383 fe8b94 118382->118383 118385 fe8bef 118382->118385 118389 fe8c1f 118382->118389 118383->118363 118459 fe26b9 19 API calls 118385->118459 118386 fe8bfc 118477 fe2610 25 API calls 118386->118477 118388 fe8bf4 118460 fe26cc 19 API calls 118388->118460 118392 fe8c38 118389->118392 118393 fe8c5e 118389->118393 118394 fe8c7a 118389->118394 118392->118393 118426 fe8c45 118392->118426 118461 fe26b9 19 API calls 118393->118461 118464 fe282e 20 API calls 118394->118464 118397 fe8c63 118462 fe26cc 19 API calls 118397->118462 118398 fe8c91 118401 fe27f4 19 API calls 118398->118401 118404 fe8c9a 118401->118404 118402 fe8de3 118405 fe8e59 118402->118405 118409 fe8dfc GetConsoleMode 118402->118409 118403 fe8c6a 118463 fe2610 25 API calls 118403->118463 118407 fe27f4 19 API calls 118404->118407 118408 fe8e5d ReadFile 118405->118408 118411 fe8ca1 118407->118411 118412 fe8e77 118408->118412 118413 fe8ed1 GetLastError 118408->118413 118409->118405 118410 fe8e0d 118409->118410 118410->118408 118414 fe8e13 ReadConsoleW 118410->118414 118415 fe8cab 118411->118415 118416 fe8cc6 118411->118416 118412->118413 118425 fe8e4e 118412->118425 118417 fe8ede 118413->118417 118418 fe8e35 118413->118418 118419 fe8e2f GetLastError 118414->118419 118414->118425 118465 fe26cc 19 API calls 118415->118465 118467 fe9254 118416->118467 118473 fe26cc 19 API calls 118417->118473 118420 fe8c75 118418->118420 118470 fe2696 19 API calls 118418->118470 118419->118418 118421 fe27f4 19 API calls 118420->118421 118421->118383 118425->118420 118431 fe8e9c 118425->118431 118432 fe8eb3 118425->118432 118448 fef74c 118426->118448 118428 fe8cb0 118466 fe26b9 19 API calls 118428->118466 118429 fe8ee3 118474 fe26b9 19 API calls 118429->118474 118471 fe8891 30 API calls 118431->118471 118432->118420 118435 fe8eca 118432->118435 118472 fe86d1 28 API calls 118435->118472 118437 fe8ecf 118437->118420 118438->118344 118439->118351 118440->118354 118441->118361 118442->118364 118443->118363 118444->118351 118445->118346 118446->118361 118447->118351 118449 fef759 118448->118449 118450 fef766 118448->118450 118478 fe26cc 19 API calls 118449->118478 118453 fef772 118450->118453 118479 fe26cc 19 API calls 118450->118479 118452 fef75e 118452->118402 118453->118402 118455 fef793 118480 fe2610 25 API calls 118455->118480 118457->118378 118458->118383 118459->118388 118460->118386 118461->118397 118462->118403 118463->118420 118464->118398 118465->118428 118466->118420 118481 fe91bb 118467->118481 118470->118420 118471->118420 118472->118437 118473->118429 118474->118420 118475->118381 118476->118386 118477->118383 118478->118452 118479->118455 118480->118452 118482 fe51f2 25 API calls 118481->118482 118483 fe91cd 118482->118483 118484 fe91e6 SetFilePointerEx 118483->118484 118485 fe91d5 118483->118485 118486 fe91fe GetLastError 118484->118486 118489 fe91da 118484->118489 118490 fe26cc 19 API calls 118485->118490 118491 fe2696 19 API calls 118486->118491 118489->118426 118490->118489 118491->118489 119751 fba18d 119752 fba1b3 119751->119752 119753 ff8fa3 119751->119753 119754 fba2fd 119752->119754 119757 fd042b 21 API calls 119752->119757 119756 ff9063 119753->119756 119760 ff9007 119753->119760 119764 ff9027 119753->119764 119761 fd045b 21 API calls 119754->119761 119801 1024358 81 API calls 119756->119801 119763 fba1dd 119757->119763 119758 ff905e 119799 fb914c 93 API calls 119760->119799 119768 fba334 119761->119768 119765 fd042b 21 API calls 119763->119765 119763->119768 119764->119758 119800 1024358 81 API calls 119764->119800 119767 fba22b 119765->119767 119766 fd045b 21 API calls 119766->119768 119767->119760 119769 fba266 119767->119769 119768->119764 119768->119766 119769->119758 119769->119768 119770 ff9086 119769->119770 119771 fba2c7 119769->119771 119773 fb9976 119769->119773 119802 1024358 81 API calls 119770->119802 119771->119754 119771->119773 119774 fd042b 21 API calls 119773->119774 119775 fb99d9 119774->119775 119791 fb1e4e 119775->119791 119778 fd042b 21 API calls 119783 fb9abe 119778->119783 119779 fb1dd1 21 API calls 119789 fb9dfc 119779->119789 119782 ff955a 119804 101010c 21 API calls 119782->119804 119783->119782 119785 ff9575 119783->119785 119786 fbfbc8 21 API calls 119783->119786 119787 fb1dd1 21 API calls 119783->119787 119788 fb9d61 119783->119788 119803 fb3574 21 API calls 119783->119803 119786->119783 119787->119783 119788->119779 119788->119789 119790 fb9e13 119789->119790 119798 fb24c6 21 API calls 119789->119798 119794 fb1e5e 119791->119794 119792 fb1e66 119792->119778 119793 fd042b 21 API calls 119793->119794 119794->119792 119794->119793 119795 fbf38f 21 API calls 119794->119795 119796 fbfbc8 21 API calls 119794->119796 119797 fb1e4e 21 API calls 119794->119797 119795->119794 119796->119794 119797->119794 119798->119789 119799->119764 119800->119758 119801->119758 119802->119758 119803->119783 119804->119785 119805 fb7dcc 119808 fb7070 119805->119808 119807 fb7dd7 119809 fb70e9 119808->119809 119813 fb7509 119808->119813 119810 fb74f3 119809->119810 119811 fb710c 119809->119811 119893 fb2236 39 API calls 119810->119893 119811->119813 119882 fb1ed0 119811->119882 119913 1024358 81 API calls 119813->119913 119816 ff75a2 119816->119807 119817 fb7308 119820 fb334c 38 API calls 119817->119820 119818 fb7490 119819 fb1d83 39 API calls 119818->119819 119819->119817 119825 fb7368 119820->119825 119823 fb7127 119823->119813 119823->119817 119823->119818 119827 fb7176 119823->119827 119865 fb740b 119823->119865 119894 1010202 81 API calls 119823->119894 119895 fb6394 92 API calls 119823->119895 119824 fb7187 119824->119813 119836 fbfbc8 21 API calls 119824->119836 119858 fb71ba 119824->119858 119824->119865 119830 ff7465 119825->119830 119831 fb737e 119825->119831 119833 ff7507 119825->119833 119825->119865 119826 ff7505 119912 fb1caa 21 API calls 119826->119912 119827->119813 119827->119824 119829 ff7279 119827->119829 119844 ff720c 119827->119844 119845 ff721e 119827->119845 119827->119865 119829->119824 119832 ff72b6 119829->119832 119898 101c409 21 API calls 119829->119898 119907 1035123 77 API calls 119830->119907 119831->119826 119831->119833 119891 fb236b 53 API calls 119831->119891 119834 fb32c3 21 API calls 119832->119834 119910 10362ca 21 API calls 119833->119910 119834->119824 119836->119858 119840 ff7274 119899 fb3574 21 API calls 119840->119899 119842 fb73c3 119842->119833 119846 ff7532 119842->119846 119892 fb236b 53 API calls 119842->119892 119843 ff74a2 119849 ff74f0 119843->119849 119850 ff74b0 119843->119850 119900 fb3574 21 API calls 119844->119900 119845->119832 119896 fb2510 21 API calls 119845->119896 119911 fb236b 53 API calls 119846->119911 119908 fb3574 21 API calls 119849->119908 119855 fb32c3 21 API calls 119850->119855 119851 ff7263 119851->119832 119897 fb2510 21 API calls 119851->119897 119854 fb73df 119854->119826 119854->119833 119861 fb7404 119854->119861 119855->119865 119858->119813 119864 fb7232 119858->119864 119858->119865 119901 fb3574 21 API calls 119858->119901 119859 ff74f9 119909 fb3574 21 API calls 119859->119909 119862 fd042b 21 API calls 119861->119862 119862->119865 119867 fb7272 119864->119867 119868 ff73c1 119864->119868 119865->119807 119866 ff73de 119904 fb2c6f 38 API calls 119866->119904 119867->119813 119867->119818 119867->119866 119873 fb72ae 119867->119873 119869 ff73d4 119868->119869 119902 fb2c6f 38 API calls 119868->119902 119903 fb2be0 38 API calls 119869->119903 119873->119866 119874 fb72c5 119873->119874 119876 fb72ca 119873->119876 119890 fb2be0 38 API calls 119874->119890 119877 fb72f4 119876->119877 119879 ff7421 119876->119879 119877->119813 119877->119817 119878 ff7435 119906 fb2be0 38 API calls 119878->119906 119879->119878 119905 fb2c6f 38 API calls 119879->119905 119883 fb2117 119882->119883 119888 fb1ee3 119882->119888 119883->119823 119885 fbf38f 21 API calls 119885->119888 119886 fb1f8d 119886->119823 119888->119885 119888->119886 119914 fd0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 119888->119914 119915 fd06d4 28 API calls 119888->119915 119916 fd080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 119888->119916 119890->119876 119891->119842 119892->119854 119893->119813 119894->119823 119895->119823 119896->119851 119897->119840 119898->119840 119899->119844 119900->119832 119901->119864 119902->119869 119903->119866 119904->119876 119905->119878 119906->119813 119907->119843 119908->119859 119909->119826 119910->119846 119911->119826 119912->119865 119913->119816 119914->119888 119915->119888 119916->119888 118492 ff2fa7 118493 fd042b 21 API calls 118492->118493 118494 ff2fae 118493->118494 118495 fd045b 21 API calls 118494->118495 118497 ff2fc7 118494->118497 118495->118497 118496 fd045b 21 API calls 118498 ff2fec 118496->118498 118497->118496 119917 123ad5a 119920 1262d51 119917->119920 119929 1262f67 119920->119929 119922 123ad66 119923 1262d60 119923->119922 119932 123e9d9 119923->119932 119936 12583c1 119923->119936 120016 12582af 119923->120016 120096 1257e05 GetCurrentProcess TerminateProcess 119923->120096 120097 1258277 119923->120097 120177 12630fe GetPEB 119929->120177 119931 1262f73 119931->119923 119933 123ea0c 119932->119933 120179 123e969 119933->120179 119937 12583c9 119936->119937 119937->119937 120241 1240d59 GetModuleHandleA 119937->120241 120017 125839c 120016->120017 120018 1240d59 43 API calls 120017->120018 120019 12583da 120018->120019 120020 1254a05 14 API calls 120019->120020 120021 12583ed 120020->120021 120022 123ecc9 11 API calls 120021->120022 120023 12583fc 120022->120023 120024 123da8d 22 API calls 120023->120024 120025 125840b 120024->120025 120026 1258414 MessageBoxA 120025->120026 120027 125842c 120025->120027 120028 12585f2 120026->120028 120029 1254ead 15 API calls 120027->120029 120030 123ec99 11 API calls 120028->120030 120031 1258439 120029->120031 120032 125860c 120030->120032 120033 123ecc9 11 API calls 120031->120033 120951 123fe9d 11 API calls 120032->120951 120035 1258446 120033->120035 120037 1258483 120035->120037 120946 1242909 11 API calls 120035->120946 120036 125861a 120038 123ec75 11 API calls 120036->120038 120040 12584a4 120037->120040 120041 125848c MessageBoxA 120037->120041 120043 1258622 120038->120043 120042 1254d05 11 API calls 120040->120042 120041->120028 120045 12584b9 120042->120045 120952 123fe9d 11 API calls 120043->120952 120044 125845c 120047 123ecc9 11 API calls 120044->120047 120048 123ecc9 11 API calls 120045->120048 120050 1258469 120047->120050 120051 12584c9 120048->120051 120049 1258630 120052 123ec99 11 API calls 120049->120052 120053 1254ead 15 API calls 120050->120053 120054 1254f15 11 API calls 120051->120054 120055 125863d 120052->120055 120056 1258476 120053->120056 120057 12584de 120054->120057 120055->119922 120058 123ecc9 11 API calls 120056->120058 120059 123ecc9 11 API calls 120057->120059 120058->120037 120060 12584eb 120059->120060 120061 1254d05 11 API calls 120060->120061 120062 1258500 120061->120062 120063 123ecc9 11 API calls 120062->120063 120064 1258510 120063->120064 120065 1254f15 11 API calls 120064->120065 120066 1258525 120065->120066 120067 123ecc9 11 API calls 120066->120067 120068 1258532 GetTickCount 120067->120068 120069 1258543 120068->120069 120070 125804d 54 API calls 120069->120070 120096->119922 120098 125827b 120097->120098 120099 1240d59 43 API calls 120098->120099 120100 12583da 120099->120100 120101 1254a05 14 API calls 120100->120101 120102 12583ed 120101->120102 120103 123ecc9 11 API calls 120102->120103 120104 12583fc 120103->120104 120105 123da8d 22 API calls 120104->120105 120106 125840b 120105->120106 120107 1258414 MessageBoxA 120106->120107 120108 125842c 120106->120108 120109 12585f2 120107->120109 120110 1254ead 15 API calls 120108->120110 120111 123ec99 11 API calls 120109->120111 120112 1258439 120110->120112 120113 125860c 120111->120113 120114 123ecc9 11 API calls 120112->120114 120958 123fe9d 11 API calls 120113->120958 120116 1258446 120114->120116 120118 1258483 120116->120118 120953 1242909 11 API calls 120116->120953 120117 125861a 120119 123ec75 11 API calls 120117->120119 120121 12584a4 120118->120121 120122 125848c MessageBoxA 120118->120122 120124 1258622 120119->120124 120123 1254d05 11 API calls 120121->120123 120122->120109 120126 12584b9 120123->120126 120959 123fe9d 11 API calls 120124->120959 120125 125845c 120128 123ecc9 11 API calls 120125->120128 120129 123ecc9 11 API calls 120126->120129 120131 1258469 120128->120131 120132 12584c9 120129->120132 120130 1258630 120133 123ec99 11 API calls 120130->120133 120134 1254ead 15 API calls 120131->120134 120135 1254f15 11 API calls 120132->120135 120136 125863d 120133->120136 120137 1258476 120134->120137 120138 12584de 120135->120138 120136->119922 120139 123ecc9 11 API calls 120137->120139 120140 123ecc9 11 API calls 120138->120140 120139->120118 120141 12584eb 120140->120141 120142 1254d05 11 API calls 120141->120142 120143 1258500 120142->120143 120144 123ecc9 11 API calls 120143->120144 120145 1258510 120144->120145 120146 1254f15 11 API calls 120145->120146 120147 1258525 120146->120147 120148 123ecc9 11 API calls 120147->120148 120149 1258532 GetTickCount 120148->120149 120150 1258543 120149->120150 120151 125804d 54 API calls 120150->120151 120178 1263111 120177->120178 120178->119931 120180 123e9b4 120179->120180 120181 123e97e 120179->120181 120180->119922 120181->120180 120184 1240a89 120181->120184 120190 123ff29 120181->120190 120185 1240a9a 120184->120185 120187 1240acb 120184->120187 120185->120187 120194 123ff71 120185->120194 120187->120181 120191 123ff55 120190->120191 120192 123ff39 GetModuleFileNameA 120190->120192 120191->120181 120222 12401bd GetModuleFileNameA RegOpenKeyExA 120192->120222 120195 123ffa1 LoadStringA 120194->120195 120197 123ff85 120194->120197 120198 123ed65 120195->120198 120196 123ff29 30 API calls 120196->120195 120197->120195 120197->120196 120203 123ed39 120198->120203 120200 123ed75 120208 123ec75 120200->120208 120204 123ed61 120203->120204 120205 123ed3d 120203->120205 120204->120200 120212 123d6f5 120205->120212 120209 123ec7b 120208->120209 120211 123ec96 120208->120211 120209->120211 120217 123d725 120209->120217 120211->120187 120213 123d715 120212->120213 120214 123d6fd 120212->120214 120213->120200 120214->120213 120216 123d7fd 11 API calls 120214->120216 120216->120213 120218 123d72a 120217->120218 120219 123d73d 120217->120219 120218->120219 120221 123d7fd 11 API calls 120218->120221 120219->120211 120221->120219 120223 124023f 120222->120223 120224 12401ff RegOpenKeyExA 120222->120224 120240 123ffe5 12 API calls 120223->120240 120224->120223 120225 124021d RegOpenKeyExA 120224->120225 120225->120223 120227 12402c8 lstrcpyn GetThreadLocale GetLocaleInfoA 120225->120227 120231 12402ff 120227->120231 120232 12403f8 120227->120232 120228 1240264 RegQueryValueExA 120229 1240284 RegQueryValueExA 120228->120229 120230 12402a6 RegCloseKey 120228->120230 120229->120230 120233 12402a2 120229->120233 120230->120191 120231->120232 120234 124030f lstrlen 120231->120234 120232->120191 120233->120230 120235 1240328 120234->120235 120235->120232 120236 1240356 lstrcpyn LoadLibraryExA 120235->120236 120237 1240382 120235->120237 120236->120237 120237->120232 120238 124038c lstrcpyn LoadLibraryExA 120237->120238 120238->120232 120239 12403c2 lstrcpyn LoadLibraryExA 120238->120239 120239->120232 120240->120228 120242 1240d8c 120241->120242 120243 123e9d9 42 API calls 120242->120243 120244 1240d98 120243->120244 120245 1254a05 120244->120245 120516 1254969 120245->120516 120247 1254a2a 120525 125486d 120247->120525 120251 1254a3f 120542 1252569 120251->120542 120568 12547cd 120516->120568 120518 1254981 120519 1254986 120518->120519 120520 1254991 120518->120520 120576 12548d5 11 API calls 120519->120576 120521 123ecc9 11 API calls 120520->120521 120523 125499d 120521->120523 120523->120247 120524 125498f 120524->120247 120526 12547cd 14 API calls 120525->120526 120527 1254885 120526->120527 120528 123ef19 120527->120528 120529 123ef1d 120528->120529 120530 123ef5c 120528->120530 120531 123ef27 120529->120531 120532 123ecc9 120529->120532 120530->120251 120533 123ef51 120531->120533 120534 123ef3a 120531->120534 120538 123ed39 11 API calls 120532->120538 120539 123ecdd 120532->120539 120536 123f241 11 API calls 120533->120536 120577 123f241 120534->120577 120541 123ef3f 120536->120541 120537 123ed0b 120537->120251 120538->120539 120539->120537 120540 123d725 11 API calls 120539->120540 120540->120537 120541->120251 120543 125257d 120542->120543 120583 12523ed 120543->120583 120546 125318d 120547 12531ae 120546->120547 120595 1253119 120547->120595 120569 123ec75 11 API calls 120568->120569 120570 12547ea 120569->120570 120571 1254811 RegOpenKeyExA 120570->120571 120572 125481c 120571->120572 120573 125485b RegCloseKey 120571->120573 120574 1254835 RegQueryValueExA 120572->120574 120573->120518 120574->120573 120575 1254843 120574->120575 120575->120573 120576->120524 120578 123f24e 120577->120578 120582 123f27e 120577->120582 120580 123f25a 120578->120580 120581 123ed39 11 API calls 120578->120581 120579 123ec75 11 API calls 120579->120580 120580->120541 120581->120582 120582->120579 120585 1252415 120583->120585 120584 123ec75 11 API calls 120587 125251f 120584->120587 120585->120584 120585->120585 120588 123ef19 11 API calls 120587->120588 120589 1252543 120587->120589 120592 123ee5d 120587->120592 120588->120587 120590 123ec75 11 API calls 120589->120590 120591 1252558 120590->120591 120591->120546 120593 123ed65 11 API calls 120592->120593 120594 123ee6a 120593->120594 120594->120587 120946->120044 120951->120036 120952->120049 120953->120125 120958->120117 120959->120130 120960 ff3644 120971 fb1b4d 120960->120971 120962 ff365a 120966 ff36d3 120962->120966 120980 fb362b 22 API calls 120962->120980 120964 ff36b3 120964->120966 120981 1022823 21 API calls 120964->120981 120968 ff4248 120966->120968 120982 1024358 81 API calls 120966->120982 120983 1024358 81 API calls 120968->120983 120970 ff4310 120972 fb1b5b 120971->120972 120973 fb1b6e 120971->120973 120984 fb3574 21 API calls 120972->120984 120975 fb1b73 120973->120975 120976 fb1ba1 120973->120976 120977 fd042b 21 API calls 120975->120977 120985 fb3574 21 API calls 120976->120985 120979 fb1b65 120977->120979 120979->120962 120980->120964 120981->120966 120982->120968 120983->120970 120984->120979 120985->120979 120986 fb1044 120991 fb921a 120986->120991 121028 fcf70a 120991->121028 120995 fb9291 120996 fbf38f 21 API calls 120995->120996 120997 fb929b 120996->120997 120998 fbf38f 21 API calls 120997->120998 120999 fb92a5 120998->120999 121000 fbf38f 21 API calls 120999->121000 121001 fb92af 121000->121001 121002 fbf38f 21 API calls 121001->121002 121003 fb92ed 121002->121003 121004 fbf38f 21 API calls 121003->121004 121005 fb93b9 121004->121005 121038 fcfb30 121005->121038 121074 fcf7cf 121028->121074 121031 fcf7cf 21 API calls 121032 fcf742 121031->121032 121033 fbf38f 21 API calls 121032->121033 121034 fcf74e 121033->121034 121035 fbf82c 21 API calls 121034->121035 121036 fb9250 121035->121036 121037 fcf9fb 6 API calls 121036->121037 121037->120995 121039 fbf38f 21 API calls 121038->121039 121040 fcfb40 121039->121040 121041 fbf38f 21 API calls 121040->121041 121042 fcfb48 121041->121042 121081 fbf2ae 121042->121081 121045 fbf2ae 21 API calls 121046 fcfb58 121045->121046 121047 fbf38f 21 API calls 121046->121047 121048 fcfb63 121047->121048 121049 fd042b 21 API calls 121048->121049 121050 fb93c3 121049->121050 121075 fbf38f 21 API calls 121074->121075 121076 fcf7da 121075->121076 121077 fbf38f 21 API calls 121076->121077 121078 fcf7e2 121077->121078 121079 fbf38f 21 API calls 121078->121079 121080 fcf738 121079->121080 121080->121031 121082 fbf38f 21 API calls 121081->121082 121083 fbf2b6 121082->121083 121083->121045

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 012401D8
                                                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 012401F6
                                                                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 01240214
                                                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 01240232
                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,012402C1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 0124027B
                                                                      • RegQueryValueExA.ADVAPI32(?,0124043D,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,012402C1,?,80000001), ref: 01240299
                                                                      • RegCloseKey.ADVAPI32(?,012402C8,00000000,00000000,00000005,00000000,012402C1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 012402BB
                                                                      • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 012402D8
                                                                      • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 012402E5
                                                                      • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 012402EB
                                                                      • lstrlen.KERNEL32(00000000), ref: 01240316
                                                                      • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 0124036B
                                                                      • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 0124037B
                                                                      • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 012403A7
                                                                      • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 012403B7
                                                                      • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 012403E1
                                                                      • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 012403F1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                      • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                      • API String ID: 1759228003-2375825460
                                                                      • Opcode ID: 771559fbc6a8331529b9d5717d3cdb3d9cca3b72e7428cfd2c5f6879d89d51aa
                                                                      • Instruction ID: 13a430b2d2b1070ab81dbe2e58d3e08c0c46ac5468b6085a5e1dc28c9d87ed69
                                                                      • Opcode Fuzzy Hash: 771559fbc6a8331529b9d5717d3cdb3d9cca3b72e7428cfd2c5f6879d89d51aa
                                                                      • Instruction Fuzzy Hash: 52612CB1F5420A7FEB15DAE8CC85FEFBBBC9B58700F4040A1BB45E6181D6B4DA848B54

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 717 12402c7-12402f9 lstrcpyn GetThreadLocale GetLocaleInfoA 719 12402ff-1240303 717->719 720 12403f8-12403fe 717->720 721 1240305-1240309 719->721 722 124030f-1240326 lstrlen 719->722 721->720 721->722 723 124032b-1240331 722->723 724 1240333-124033c 723->724 725 124033e-1240347 723->725 724->725 726 1240328 724->726 725->720 727 124034d-1240354 725->727 726->723 728 1240356-1240380 lstrcpyn LoadLibraryExA 727->728 729 1240382-1240384 727->729 728->729 729->720 730 1240386-124038a 729->730 730->720 731 124038c-12403c0 lstrcpyn LoadLibraryExA 730->731 731->720 732 12403c2-12403f6 lstrcpyn LoadLibraryExA 731->732 732->720
                                                                      APIs
                                                                      • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 012402D8
                                                                      • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 012402E5
                                                                      • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 012402EB
                                                                      • lstrlen.KERNEL32(00000000), ref: 01240316
                                                                      • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 0124036B
                                                                      • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 0124037B
                                                                      • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 012403A7
                                                                      • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 012403B7
                                                                      • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 012403E1
                                                                      • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 012403F1
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                                      • String ID:
                                                                      • API String ID: 1599918012-0
                                                                      • Opcode ID: b30b88bd219cbaf4d9da21ce8602e9a1d9637ed92d71513b3b0053543624a1ba
                                                                      • Instruction ID: b162c91ac34427b960dab261c7b743f286830bbc0d5dca1970e797a77df4b766
                                                                      • Opcode Fuzzy Hash: b30b88bd219cbaf4d9da21ce8602e9a1d9637ed92d71513b3b0053543624a1ba
                                                                      • Instruction Fuzzy Hash: 87313F71F1420A6FEB59DBE8C884BEFBBBC9B58300F404191B659E6181D6B8DA858F50
                                                                      APIs
                                                                        • Part of subcall function 00FC4E5A: GetWindowLongW.USER32(00000000,000000EB), ref: 00FC4E6B
                                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00FC4273
                                                                      • GetSysColor.USER32(0000000F), ref: 00FC42C5
                                                                      • SetBkColor.GDI32(?,00000000), ref: 00FC42D8
                                                                        • Part of subcall function 00FC3AE2: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00FC3B2A
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: ColorProc$LongWindow
                                                                      • String ID:
                                                                      • API String ID: 3744519093-0
                                                                      • Opcode ID: ae302a80559d3b7acb26f4d86a798de7801ae60ba4058660205aa90cf19ee6a3
                                                                      • Instruction ID: 3adfdf936816207aa3223d2c28715a261f1ab10c2ca4a647f483d261f14d4b69
                                                                      • Opcode Fuzzy Hash: ae302a80559d3b7acb26f4d86a798de7801ae60ba4058660205aa90cf19ee6a3
                                                                      • Instruction Fuzzy Hash: A6A12871904102ABF6759A2C8EAAFFF3A9DFB56350F16411EF1C1C61C5CA26AD01E371
                                                                      APIs
                                                                      • FindFirstFileA.KERNEL32(00000000,?), ref: 012426D0
                                                                      • FindClose.KERNEL32(00000000,00000000,?), ref: 012426DB
                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 012426F4
                                                                      • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 01242705
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: FileTime$Find$CloseDateFirstLocal
                                                                      • String ID:
                                                                      • API String ID: 2659516521-0
                                                                      • Opcode ID: 35532445bcddddf072de4610115932bee76e299e86bdf79fb3123370f2aa134a
                                                                      • Instruction ID: 60e969e7ef3e5b190860d150d19ff4afd0d6b66547b7a9471a7b1b7a596352b0
                                                                      • Opcode Fuzzy Hash: 35532445bcddddf072de4610115932bee76e299e86bdf79fb3123370f2aa134a
                                                                      • Instruction Fuzzy Hash: AFF01272D1020DA7CB69EAE9DD84ADEB3BC5F09214F100692B669E3191EB34DB548B50
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: 74906ca78a5ed234824da2d21b4ef579ad23ae74e18219abc59e4195ec916c3d
                                                                      • Instruction ID: be68be7296445d1d8c9efe5ed17a0ddc0ed5e3a0c0ce8a40cfea562a1559ef80
                                                                      • Opcode Fuzzy Hash: 74906ca78a5ed234824da2d21b4ef579ad23ae74e18219abc59e4195ec916c3d
                                                                      • Instruction Fuzzy Hash: 24A00231445A80DBDE11DB10CB49B09B761FBC0F01F108E64A0464781457785800D941

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 fc51fb-fc522a call fd042b call fc5d68 5 1008d54-1008d58 0->5 6 fc5230-fc5243 call fc2960 0->6 7 fc5245-fc5262 5->7 8 1008d5e 5->8 6->7 12 fc5269-fc5276 7->12 13 fc5264 7->13 10 1008d64-1008d6a 8->10 10->7 14 1008d70-1008d73 10->14 15 fc527c-fc5282 12->15 16 1008d7a-1008d7c 12->16 13->12 14->10 17 1008d75 14->17 18 fc5288-fc5298 15->18 19 1008d87 15->19 16->19 17->7 20 1008d92-1008d97 18->20 21 fc529e-fc52b3 18->21 19->20 24 1008dc9-1008de1 call fc4e5a 20->24 25 1008d99-1008d9b 20->25 22 fc52b9-fc52bd 21->22 23 1008e5a 21->23 26 1008e62 22->26 27 fc52c3-fc52c6 22->27 23->26 39 1008de3-1008dee 24->39 40 1008df5-1008e45 GetWindowRect GetClientRect GetSystemMetrics * 2 24->40 29 1008da0 25->29 35 1008e6a-1008e6e 26->35 30 fc52c8-fc52f2 SystemParametersInfoW GetSystemMetrics 27->30 31 fc52f5-fc52f9 27->31 33 1008da2-1008dac call fc5c2e 29->33 34 1008dae-1008db9 29->34 30->31 37 fc52fb-fc532e SystemParametersInfoW GetSystemMetrics 31->37 38 fc5341-fc539c SetRect AdjustWindowRectEx CreateWindowExW 31->38 36 1008dc2 33->36 34->36 42 1008e74-1008e78 35->42 43 1008dbb-1008dbd call 1048251 35->43 36->24 37->38 44 fc5330-fc533e GetSystemMetrics 37->44 45 1008d9d 38->45 46 fc53a2-fc5405 SetWindowLongW GetClientRect GetStockObject SendMessageW call fc4b74 38->46 39->40 47 1008e52 40->47 48 1008e47-1008e4f GetSystemMetrics 40->48 42->43 51 1008e7e-1008e82 call fc544c 42->51 43->36 44->38 45->29 56 fc541d-fc543b call fc5915 46->56 57 fc5407-fc5418 SetTimer 46->57 47->23 48->47 55 1008e87 51->55 55->55 56->35 60 fc5441-fc5449 56->60 57->56
                                                                      APIs
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00FC52D2
                                                                      • GetSystemMetrics.USER32(00000007), ref: 00FC52DA
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00FC5305
                                                                      • GetSystemMetrics.USER32(00000008), ref: 00FC530D
                                                                      • GetSystemMetrics.USER32(00000004), ref: 00FC5332
                                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00FC534F
                                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00FC535F
                                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00FC5392
                                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00FC53A6
                                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00FC53C4
                                                                      • GetStockObject.GDI32(00000011), ref: 00FC53E0
                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00FC53EB
                                                                        • Part of subcall function 00FC4B74: GetCursorPos.USER32(?), ref: 00FC4B88
                                                                        • Part of subcall function 00FC4B74: ScreenToClient.USER32(00000000,?), ref: 00FC4BA5
                                                                        • Part of subcall function 00FC4B74: GetAsyncKeyState.USER32(00000001), ref: 00FC4BCE
                                                                        • Part of subcall function 00FC4B74: GetAsyncKeyState.USER32(00000002), ref: 00FC4BE8
                                                                      • SetTimer.USER32(00000000,00000000,00000028,00FC3AA8), ref: 00FC5412
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                      • String ID: AutoIt v3 GUI
                                                                      • API String ID: 1458621304-248962490
                                                                      • Opcode ID: ac721390ffcf1de20dcbef1d5d2fea9de6590b03b44d46cdc72242a9bd3b246c
                                                                      • Instruction ID: b98f0cace6b333b50354f417372e267cb6e6f212f100d31b0abd0a52f16f1da1
                                                                      • Opcode Fuzzy Hash: ac721390ffcf1de20dcbef1d5d2fea9de6590b03b44d46cdc72242a9bd3b246c
                                                                      • Instruction Fuzzy Hash: FCB18D75A0020ADFDF24DFA8CA85FAD3BF4FB48714F00421AFA85A7284DB75A840DB50
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Message$DispatchSleepTimeTranslatetime
                                                                      • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                                      • API String ID: 1406140084-758534266
                                                                      • Opcode ID: abb1673af26d17588602716d26e94c25b579297d404515676f5d76604db1d6f3
                                                                      • Instruction ID: 77b49bebe11e96d417d0f81d868b7401ea1ff7113372a37c976da8b863a10f08
                                                                      • Opcode Fuzzy Hash: abb1673af26d17588602716d26e94c25b579297d404515676f5d76604db1d6f3
                                                                      • Instruction Fuzzy Hash: A452FFB0A08346DFD724DF24C884BEAB7E5BF80314F14451DE5998B2A1DB79A844EF93

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 369 1255c39-1255c88 call 123f101 * 2 374 1255c8f-1255c96 369->374 375 1255c8a call 12514b5 369->375 377 1256225-1256257 call 123ec99 call 123ec75 call 123ec99 374->377 378 1255c9c-1255caa 374->378 375->374 378->377 379 1255cb0-1255cc5 378->379 379->377 381 1255ccb-1255cf9 call 1255109 * 2 379->381 391 1255d03 381->391 392 1255cfb-1255d01 381->392 393 1255d09-1255d14 391->393 392->393 394 1255d74-1255d9c call 123f111 CreateProcessA 393->394 395 1255d16-1255d45 call 123f111 * 2 CreateProcessA 393->395 401 1255df4-1255e03 call 1255a91 394->401 402 1255d9e-1255dbc CreateProcessA 394->402 395->401 406 1255d4b-1255d69 CreateProcessA 395->406 409 1255e09-1255e4c call 125190d call 1255821 401->409 410 12561ea-12561ec 401->410 402->401 404 1255dbe-1255dee call 1242909 call 123f111 CreateProcessA 402->404 404->377 404->401 406->377 411 1255d6f 406->411 422 1255e52-1255e69 409->422 423 12560fa-125612f call 125190d 409->423 414 1256220 GetTickCount 410->414 415 12561ee-125621b call 125190d 410->415 411->401 414->377 415->414 425 1255ee6-1255eff call 12558bd 422->425 426 1255e6b-1255ea3 call 125190d 422->426 431 1256131-1256146 call 1255c39 423->431 432 125614b-125614e 423->432 430 1255f04 425->430 438 1255ea5-1255ec6 call 12558bd 426->438 439 1255ec8-1255ee4 call 12558bd 426->439 434 1255f07-1255f0b 430->434 431->377 436 1256150-1256165 call 1255c39 432->436 437 125616a-125618b call 123ef5d call 12546d1 432->437 440 1255f2d-1255f31 434->440 441 1255f0d-1255f11 434->441 436->377 437->377 438->434 439->434 451 1255f34-1255f36 440->451 447 1255f25-1255f27 441->447 448 1255f13-1255f23 call 1255885 441->448 447->451 448->447 463 1255f29-1255f2b 448->463 455 1256063-1256099 call 125190d 451->455 456 1255f3c-1255f7b call 1255b95 call 1255955 451->456 465 12560b5-12560b8 455->465 466 125609b-12560b0 call 1255c39 455->466 472 1255f81-1255f8c 456->472 473 125604a-125604e 456->473 463->451 469 12560d4-12560f5 call 123ef5d call 12546d1 465->469 470 12560ba-12560cf call 1255c39 465->470 466->377 469->377 470->377 477 1255fbd-1255ff7 call 125190d call 1255821 472->477 478 1255f8e-1255fb8 call 1255ad1 call 12550fd 472->478 479 1256054-125605e call 12406bd 473->479 480 1256190-12561e5 call 125190d 473->480 477->473 495 1255ff9-1256042 call 1255955 call 125190d 477->495 478->477 479->480 480->410 499 1256047 495->499 499->473
                                                                      APIs
                                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,01256258), ref: 01255D3E
                                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,01256258,00000000,00000000,00000000,00000000,00000000,00000004), ref: 01255D62
                                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,01256258), ref: 01255D95
                                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,01256258,00000000,00000000,00000000,00000000,00000000,00000004), ref: 01255DB5
                                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,01256258,00000000,00000000,00000000,00000000,00000000,00000004), ref: 01255DE7
                                                                        • Part of subcall function 0125190D: GetTickCount.KERNEL32 ref: 01251986
                                                                        • Part of subcall function 012546D1: MessageBoxA.USER32(00000000,00000000,01254731,00040040), ref: 01254704
                                                                      • GetTickCount.KERNEL32 ref: 01256220
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CreateProcess$CountTick$Message
                                                                      • String ID: execution failure, try to assign other file path$D$NtFreeVirtualMemory$NtGetContextThread$NtResumeThread$NtSetContextThread$NtTerminateProcess$NtUnmapViewOfSection
                                                                      • API String ID: 2713535555-1661097759
                                                                      • Opcode ID: 213f674e7243ebffe692ff3d304aecdbadeb973b24af81b773d2b0746c6aa922
                                                                      • Instruction ID: 88959b1da1e3aae037374529726d5aac6b78d2e79414daaa370b0b2ed911bab2
                                                                      • Opcode Fuzzy Hash: 213f674e7243ebffe692ff3d304aecdbadeb973b24af81b773d2b0746c6aa922
                                                                      • Instruction Fuzzy Hash: 4412FF74A10219AFEB90DBA8CC85FEEBBF4AF09704F504095EA14F7281D774A984CF65

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 500 fc310d-fc317c call fbf38f GetVersionExW call fbf82c 505 1007ad9-1007aec 500->505 506 fc3182 500->506 507 1007aed-1007af1 505->507 508 fc3184-fc3186 506->508 509 1007af3 507->509 510 1007af4-1007b00 507->510 511 fc318c-fc31e6 call fbf9a0 call fbf433 508->511 512 1007b18 508->512 509->510 510->507 513 1007b02-1007b04 510->513 524 fc31ec-fc31ee 511->524 525 1007c2f-1007c36 511->525 516 1007b1f-1007b2b 512->516 513->508 515 1007b0a-1007b11 513->515 515->505 518 1007b13 515->518 519 fc324c-fc3266 GetCurrentProcess IsWow64Process 516->519 518->512 521 fc3268 519->521 522 fc32c7-fc32cd 519->522 526 fc326e-fc327a 521->526 522->526 527 1007b30-1007b43 524->527 528 fc31f4-fc31f7 524->528 531 1007c56-1007c59 525->531 532 1007c38 525->532 529 1007c74-1007c78 GetSystemInfo 526->529 530 fc3280-fc328f LoadLibraryA 526->530 538 1007b45-1007b4e 527->538 539 1007b6c-1007b6e 527->539 528->519 535 fc31f9-fc3235 528->535 536 fc32cf-fc32d9 GetSystemInfo 530->536 537 fc3291-fc329f GetProcAddress 530->537 533 1007c44-1007c4c 531->533 534 1007c5b-1007c6a 531->534 540 1007c3e 532->540 533->531 534->540 544 1007c6c-1007c72 534->544 535->519 545 fc3237-fc3240 535->545 541 fc32a7-fc32a9 536->541 537->536 546 fc32a1-fc32a5 GetNativeSystemInfo 537->546 547 1007b50-1007b56 538->547 548 1007b5b-1007b67 538->548 542 1007b70-1007b85 539->542 543 1007ba3-1007ba6 539->543 540->533 554 fc32ab-fc32ac FreeLibrary 541->554 555 fc32b2-fc32c6 541->555 549 1007b92-1007b9e 542->549 550 1007b87-1007b8d 542->550 551 1007be1-1007be4 543->551 552 1007ba8-1007bc3 543->552 544->533 545->516 553 fc3246 545->553 546->541 547->519 548->519 549->519 550->519 551->519 558 1007bea-1007c11 551->558 556 1007bd0-1007bdc 552->556 557 1007bc5-1007bcb 552->557 553->519 554->555 556->519 557->519 559 1007c13-1007c19 558->559 560 1007c1e-1007c2a 558->560 559->519 560->519
                                                                      APIs
                                                                      • GetVersionExW.KERNEL32(?), ref: 00FC313C
                                                                      • GetCurrentProcess.KERNEL32(?,0104D9B8,00000000,?,?), ref: 00FC3253
                                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00FC325A
                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00FC3285
                                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00FC3297
                                                                      • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00FC32A5
                                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 00FC32AC
                                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 00FC32D3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64
                                                                      • String ID: GetNativeSystemInfo$kernel32.dll
                                                                      • API String ID: 2834427828-192647395
                                                                      • Opcode ID: 8f9385d2d018e04b7bb8bc48d3b3f085c6643d1d0e22a1ce60cdadd0a6afb568
                                                                      • Instruction ID: 2ea4309e1dc825bd77bcc6f189195f937f6823cdb46249c4a9b56b4a59043087
                                                                      • Opcode Fuzzy Hash: 8f9385d2d018e04b7bb8bc48d3b3f085c6643d1d0e22a1ce60cdadd0a6afb568
                                                                      • Instruction Fuzzy Hash: F091D77280D3C6EFDB32D77C75626DD3FA46B36600B04C4ADE4C09724AC22E4548EB21

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FC2D63
                                                                      • IsDebuggerPresent.KERNEL32 ref: 00FC2D76
                                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00FC2DE2
                                                                        • Part of subcall function 00FBA65C: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FBA69D
                                                                      • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 00FC2E63
                                                                      • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 01007988
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 010079C9
                                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01071E24), ref: 01007A52
                                                                      • ShellExecuteW.SHELL32(00000000), ref: 01007A59
                                                                        • Part of subcall function 00FC2C51: GetSysColorBrush.USER32(0000000F), ref: 00FC2C5C
                                                                        • Part of subcall function 00FC2C51: LoadCursorW.USER32(00000000,00007F00), ref: 00FC2C6B
                                                                        • Part of subcall function 00FC2C51: LoadIconW.USER32(00000063), ref: 00FC2C81
                                                                        • Part of subcall function 00FC2C51: LoadIconW.USER32(000000A4), ref: 00FC2C93
                                                                        • Part of subcall function 00FC2C51: LoadIconW.USER32(000000A2), ref: 00FC2CA5
                                                                        • Part of subcall function 00FC2C51: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FC2CBD
                                                                        • Part of subcall function 00FC2C51: RegisterClassExW.USER32(?), ref: 00FC2D0E
                                                                        • Part of subcall function 00FCFBB7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FCFBE5
                                                                        • Part of subcall function 00FCFBB7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FCFC06
                                                                        • Part of subcall function 00FCFBB7: ShowWindow.USER32(00000000), ref: 00FCFC1A
                                                                        • Part of subcall function 00FCFBB7: ShowWindow.USER32(00000000), ref: 00FCFC23
                                                                        • Part of subcall function 00FC34C7: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FC3598
                                                                      Strings
                                                                      • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 01007982
                                                                      • runas, xrefs: 01007A4D
                                                                      • AutoIt, xrefs: 0100797D
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell_
                                                                      • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                      • API String ID: 1385234928-2030392706
                                                                      • Opcode ID: 61d9f5fc79b0b9fe8bc3ebd71b536d5f585c8b09a9967fe79acbd09933d6c864
                                                                      • Instruction ID: fa4cca6a21f0d303da11c1f229f7ca7777f1c810503ed8f0b7eb33587809af88
                                                                      • Opcode Fuzzy Hash: 61d9f5fc79b0b9fe8bc3ebd71b536d5f585c8b09a9967fe79acbd09933d6c864
                                                                      • Instruction Fuzzy Hash: 0A51687150C341ABD721FFA5DD62EAE7BE8FB91740F00442CF5C152192CB2E9A49EB62

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00FC50AD
                                                                      • RegisterClassExW.USER32(00000030), ref: 00FC50D7
                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FC50E8
                                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00FC5105
                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FC5115
                                                                      • LoadIconW.USER32(000000A9), ref: 00FC512B
                                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FC513A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                      • API String ID: 2914291525-1005189915
                                                                      • Opcode ID: 16b2b08fea7235c9102ef21f53918310c51f4de0f918b8fdbb32a9c9dc16da51
                                                                      • Instruction ID: 45546b61d645a7abdcb9d389fde2d735d74b757e89f68b49ef202651b8b6101c
                                                                      • Opcode Fuzzy Hash: 16b2b08fea7235c9102ef21f53918310c51f4de0f918b8fdbb32a9c9dc16da51
                                                                      • Instruction Fuzzy Hash: 402124B8D05308AFDB20DFE4E988BDDBBB4FB18750F00411AFA90A6284D7BA4540CF94

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 626 123d929-123d93d 627 123d949-123d94f 626->627 628 123d951-123d954 627->628 629 123d956-123d95b 627->629 628->629 630 123d93f-123d947 CharNextA 628->630 631 123d96a-123d972 629->631 632 123d95d-123d963 629->632 630->627 634 123d9cf-123d9d4 631->634 632->631 633 123d965-123d968 632->633 633->627 635 123d9d6-123d9f3 call 123f241 634->635 636 123d974-123d979 634->636 642 123da70-123da75 635->642 638 123d9bb-123d9cd CharNextA 636->638 639 123d97b-123d985 CharNextA 636->639 638->634 641 123d99b-123d9a1 639->641 643 123d9a3-123d9a6 641->643 644 123d9a8-123d9ad 641->644 647 123d9f5-123d9fa 642->647 648 123da7b-123da8c 642->648 643->644 645 123d987-123d999 CharNextA 643->645 644->634 646 123d9af-123d9b9 CharNextA 644->646 645->641 646->634 649 123da4c-123da5a CharNextA 647->649 650 123d9fc-123da06 CharNextA 647->650 649->642 651 123da5c-123da6e 649->651 652 123da2c-123da32 650->652 651->642 651->651 653 123da34-123da37 652->653 654 123da39-123da3e 652->654 653->654 655 123da08-123da16 CharNextA 653->655 654->642 656 123da40-123da4a CharNextA 654->656 655->652 657 123da18-123da2a 655->657 656->642 657->652 657->657
                                                                      APIs
                                                                      • CharNextA.USER32(00000000), ref: 0123D97E
                                                                      • CharNextA.USER32(00000000,00000000), ref: 0123D98A
                                                                      • CharNextA.USER32(00000000,00000000), ref: 0123D9B2
                                                                      • CharNextA.USER32(00000000), ref: 0123D9BE
                                                                      • CharNextA.USER32(?,00000000), ref: 0123D9FF
                                                                      • CharNextA.USER32(00000000,?,00000000), ref: 0123DA0B
                                                                      • CharNextA.USER32(00000000,?,00000000), ref: 0123DA43
                                                                      • CharNextA.USER32(?,00000000), ref: 0123DA4F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext
                                                                      • String ID: $"$"
                                                                      • API String ID: 3213498283-938660540
                                                                      • Opcode ID: a74b84504903bc6848e67ef457c7a6e515321d0edc5c07087f1d644512264336
                                                                      • Instruction ID: 6d2bb3d260640e1a2afdb0a84e44cfdf776524cb833e8da7d0d183db6763ab04
                                                                      • Opcode Fuzzy Hash: a74b84504903bc6848e67ef457c7a6e515321d0edc5c07087f1d644512264336
                                                                      • Instruction Fuzzy Hash: 9051D7F4628286DFD321DFADC484A15BBF5EF9A250FA40C59E6C5CB312D335A841CB61

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00FC2C5C
                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00FC2C6B
                                                                      • LoadIconW.USER32(00000063), ref: 00FC2C81
                                                                      • LoadIconW.USER32(000000A4), ref: 00FC2C93
                                                                      • LoadIconW.USER32(000000A2), ref: 00FC2CA5
                                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FC2CBD
                                                                      • RegisterClassExW.USER32(?), ref: 00FC2D0E
                                                                        • Part of subcall function 00FC507A: GetSysColorBrush.USER32(0000000F), ref: 00FC50AD
                                                                        • Part of subcall function 00FC507A: RegisterClassExW.USER32(00000030), ref: 00FC50D7
                                                                        • Part of subcall function 00FC507A: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FC50E8
                                                                        • Part of subcall function 00FC507A: InitCommonControlsEx.COMCTL32(?), ref: 00FC5105
                                                                        • Part of subcall function 00FC507A: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FC5115
                                                                        • Part of subcall function 00FC507A: LoadIconW.USER32(000000A9), ref: 00FC512B
                                                                        • Part of subcall function 00FC507A: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FC513A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                      • String ID: #$0$AutoIt v3
                                                                      • API String ID: 423443420-4155596026
                                                                      • Opcode ID: 0275383f3b976874705db5224a4e6bf58b283f21781651e4018d05ce41225ccf
                                                                      • Instruction ID: 279f15fe3fe42191c8a735012de1001767cd1185863fefc276b1e404a13ef1d6
                                                                      • Opcode Fuzzy Hash: 0275383f3b976874705db5224a4e6bf58b283f21781651e4018d05ce41225ccf
                                                                      • Instruction Fuzzy Hash: D4215EB4D04318AFDB209FA5E955B9EBFB4FB08B10F00802AF9C4A6284D7BB0550DF94

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 661 fc3998-fc39ad 662 fc3a0d-fc3a0f 661->662 663 fc39af-fc39b2 661->663 662->663 664 fc3a11 662->664 665 fc39b4-fc39bb 663->665 666 fc3a13 663->666 667 fc39f8-fc3a00 DefWindowProcW 664->667 670 fc3a8d-fc3a95 PostQuitMessage 665->670 671 fc39c1-fc39c6 665->671 668 10080b1-10080d9 call fbad2c call fbad46 666->668 669 fc3a19-fc3a1e 666->669 677 fc3a06-fc3a0c 667->677 707 10080de-10080e5 668->707 672 fc3a45-fc3a6c SetTimer RegisterWindowMessageW 669->672 673 fc3a20-fc3a23 669->673 678 fc3a41-fc3a43 670->678 674 fc39cc-fc39d0 671->674 675 100811e-1008132 call 101cde4 671->675 672->678 681 fc3a6e-fc3a79 CreatePopupMenu 672->681 679 1008052-1008055 673->679 680 fc3a29-fc3a3c KillTimer call fc35b3 call fc514d 673->680 682 fc39d6-fc39db 674->682 683 fc3a97-fc3aa1 call fc3619 674->683 675->678 701 1008138 675->701 678->677 687 1008057-100805b 679->687 688 100808d-10080ac MoveWindow 679->688 680->678 681->678 690 1008103-100810a 682->690 691 fc39e1-fc39e6 682->691 694 fc3aa6 683->694 695 100807c-1008088 SetFocus 687->695 696 100805d-1008060 687->696 688->678 690->667 698 1008110-1008119 call 1011bdd 690->698 699 fc39ec-fc39f2 691->699 700 fc3a7b-fc3a8b call fc36c0 691->700 694->678 695->678 696->699 703 1008066-1008077 call fbad2c 696->703 698->667 699->667 699->707 700->678 701->667 703->678 707->667 708 10080eb-10080fe call fc35b3 call fc34c7 707->708 708->667
                                                                      APIs
                                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00FC3992,?,?), ref: 00FC3A00
                                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,00FC3992,?,?), ref: 00FC3A2C
                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FC3A4F
                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00FC3992,?,?), ref: 00FC3A5A
                                                                      • CreatePopupMenu.USER32 ref: 00FC3A6E
                                                                      • PostQuitMessage.USER32(00000000), ref: 00FC3A8F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                      • String ID: TaskbarCreated
                                                                      • API String ID: 129472671-2362178303
                                                                      • Opcode ID: f3662fc959f033ba5588f8db0424a66f457299e3aec46589a004d8a2f1511ac6
                                                                      • Instruction ID: dc92de0b528c208ddec68f13729573506c90bd90f24d5dd10fe91d9cbc86cb08
                                                                      • Opcode Fuzzy Hash: f3662fc959f033ba5588f8db0424a66f457299e3aec46589a004d8a2f1511ac6
                                                                      • Instruction Fuzzy Hash: B6412935548106ABEB25AF78DE4BF6D3A55F704390F00C21DF5C2862C5DABE9A10F7A1

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00FB1155: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF), ref: 00FB1173
                                                                        • Part of subcall function 00FCFD48: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00FC0F35), ref: 00FCFD6A
                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00FC0F78
                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 01006FEF
                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 01007030
                                                                      • RegCloseKey.ADVAPI32(?), ref: 01007072
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: NameQueryValue$CloseFileFullModuleOpenPath
                                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                      • API String ID: 338900592-2727554177
                                                                      • Opcode ID: bea4c50205b4af968ea1d49082cedc22d3b6cf3aa876074795563da8cdd44a86
                                                                      • Instruction ID: a6ef9c75a643abc9881e7b69e5a4011f6b685be99f3a149df3767d30945bc036
                                                                      • Opcode Fuzzy Hash: bea4c50205b4af968ea1d49082cedc22d3b6cf3aa876074795563da8cdd44a86
                                                                      • Instruction Fuzzy Hash: 85718C714083019ED320EF69EC819AFBBE8BF84B40F40442EB4C58B2A0DB39D949DB52

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 803 ff0585-ff05b5 call ff0359 806 ff05b7-ff05c2 call fe26b9 803->806 807 ff05d0-ff05dc call fe504f 803->807 814 ff05c4-ff05cb call fe26cc 806->814 812 ff05de-ff05f3 call fe26b9 call fe26cc 807->812 813 ff05f5-ff063e call ff02c4 807->813 812->814 823 ff06ab-ff06b4 GetFileType 813->823 824 ff0640-ff0649 813->824 821 ff08a7-ff08ad 814->821 825 ff06fd-ff0700 823->825 826 ff06b6-ff06e7 GetLastError call fe2696 CloseHandle 823->826 828 ff064b-ff064f 824->828 829 ff0680-ff06a6 GetLastError call fe2696 824->829 832 ff0709-ff070f 825->832 833 ff0702-ff0707 825->833 826->814 840 ff06ed-ff06f8 call fe26cc 826->840 828->829 834 ff0651-ff067e call ff02c4 828->834 829->814 837 ff0713-ff0761 call fe4f98 832->837 838 ff0711 832->838 833->837 834->823 834->829 845 ff0763-ff076f call ff04d5 837->845 846 ff0771-ff0795 call ff0077 837->846 838->837 840->814 845->846 852 ff0799-ff07a3 call fe84de 845->852 853 ff07a8-ff07eb 846->853 854 ff0797 846->854 852->821 856 ff07ed-ff07f1 853->856 857 ff080c-ff081a 853->857 854->852 856->857 859 ff07f3-ff0807 856->859 860 ff08a5 857->860 861 ff0820-ff0824 857->861 859->857 860->821 861->860 862 ff0826-ff0859 CloseHandle call ff02c4 861->862 865 ff088d-ff08a1 862->865 866 ff085b-ff0887 GetLastError call fe2696 call fe5161 862->866 865->860 866->865
                                                                      APIs
                                                                        • Part of subcall function 00FF02C4: CreateFileW.KERNELBASE(00000000,00000000,?,00FF062E,?,?,00000000,?,00FF062E,00000000,0000000C), ref: 00FF02E1
                                                                      • GetLastError.KERNEL32 ref: 00FF0699
                                                                      • GetFileType.KERNELBASE(00000000), ref: 00FF06AC
                                                                      • GetLastError.KERNEL32 ref: 00FF06B6
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FF06DF
                                                                      • CloseHandle.KERNEL32(?), ref: 00FF0829
                                                                      • GetLastError.KERNEL32 ref: 00FF085B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CloseFileHandle$CreateType
                                                                      • String ID: H
                                                                      • API String ID: 3086256261-2852464175
                                                                      • Opcode ID: 6a2f757456330c22da68819250d58af816421ee3730eb45b3cfd84eb927dc48b
                                                                      • Instruction ID: 4c46fad4d2bd47193cbfc21dce8a187f0d087f87d89ec2dfde3b472443e0ee38
                                                                      • Opcode Fuzzy Hash: 6a2f757456330c22da68819250d58af816421ee3730eb45b3cfd84eb927dc48b
                                                                      • Instruction Fuzzy Hash: B8A13732A041589FDF28EF68DC817BD7BA0AF06324F180159F941DB2E2DB399812EB51

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • MessageBoxA.USER32(00000000,Executing manually will not work,01258661,00000000), ref: 01258422
                                                                      • MessageBoxA.USER32(00000000,no data,01258661,00000000), ref: 0125849A
                                                                      • GetTickCount.KERNEL32 ref: 01258532
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Message$CountTick
                                                                      • String ID: Executing manually will not work$no data$uPQzHOdQ
                                                                      • API String ID: 1431039135-1731644993
                                                                      • Opcode ID: 23f0c691bb8d4f3c59c2cfa2663b8e0fe6349ba62ad9ecfe61d0c3737769f0ae
                                                                      • Instruction ID: 9eb028b1ed0c53970e7504d2415113280425faedbc3ceb334ef18397f9c811c7
                                                                      • Opcode Fuzzy Hash: 23f0c691bb8d4f3c59c2cfa2663b8e0fe6349ba62ad9ecfe61d0c3737769f0ae
                                                                      • Instruction Fuzzy Hash: DE614B38620206CFCBA0FF95E4C9AADB3B5FB98214F514655ED00AB358DB70AC468F71

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 957 fcfbb7-fcfc27 CreateWindowExW * 2 ShowWindow * 2
                                                                      APIs
                                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FCFBE5
                                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FCFC06
                                                                      • ShowWindow.USER32(00000000), ref: 00FCFC1A
                                                                      • ShowWindow.USER32(00000000), ref: 00FCFC23
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CreateShow
                                                                      • String ID: AutoIt v3$edit
                                                                      • API String ID: 1584632944-3779509399
                                                                      • Opcode ID: 7798be0b456edd4bdf8e16ae95b91ea2c814c57ccaa69989bf882bf29372e3ef
                                                                      • Instruction ID: 821efa1149afe0ea1630c36659b43a3c43786b84cfaf2ffac691018cb0d4b50f
                                                                      • Opcode Fuzzy Hash: 7798be0b456edd4bdf8e16ae95b91ea2c814c57ccaa69989bf882bf29372e3ef
                                                                      • Instruction Fuzzy Hash: 43F05EB0A443947BEA306617AD5CE3B3EBDE7DAF50F00405EBDC0A2164C16A0810CBB4
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,012555B5,00000001,00000000,00000000,00000000), ref: 01251181
                                                                      • MessageBoxA.USER32(00000000,0125129D,01251299,00000000), ref: 0125119B
                                                                      • GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,012555B5,00000001,00000000), ref: 012511A3
                                                                      • ReadFile.KERNEL32(00000000,00000000,00000003,00000003,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 012511C5
                                                                      • MessageBoxA.USER32(00000000,012512A1,01251299,00000000), ref: 012511DC
                                                                      • CloseHandle.KERNEL32(00000000,00000000,00000000,00000003,00000003,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 01251286
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: File$Message$CloseCreateHandleReadSize
                                                                      • String ID:
                                                                      • API String ID: 2324011479-0
                                                                      • Opcode ID: f1f0e1494ebd3de71f24a31b1ce60c50c044dd5802666a9c0f5392d1b99455ed
                                                                      • Instruction ID: 732ebb8cedcf9af34f77e0f5c3d00fd9028b73e0aff8fe33ce69ac2a8cf71c4e
                                                                      • Opcode Fuzzy Hash: f1f0e1494ebd3de71f24a31b1ce60c50c044dd5802666a9c0f5392d1b99455ed
                                                                      • Instruction Fuzzy Hash: 8A3139B4354302AFD354EF19CC81F6AB3E4EF98A50F508928F998DB381DA70E8558B61
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cb310a9c27f7fa57cdc32772fb05fb13b408663f279ddd5dbe03d7813e5010f8
                                                                      • Instruction ID: 1c708c754f77c7ad3d341def434b44748a3148c77a646ed5105315621595c271
                                                                      • Opcode Fuzzy Hash: cb310a9c27f7fa57cdc32772fb05fb13b408663f279ddd5dbe03d7813e5010f8
                                                                      • Instruction Fuzzy Hash: 23C11671E042C9AFCF11EFEAD841BADBBB4BF19350F140144E458A7382DB789942EB61
                                                                      APIs
                                                                      • MessageBoxA.USER32(00000000,Executing manually will not work,01258661,00000000), ref: 01258422
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: >$Executing manually will not work$uPQzHOdQ
                                                                      • API String ID: 2030045667-1937669157
                                                                      • Opcode ID: 84a7a200ca55a27a3d058c212b27bfde08dad525f1d8483ad676d170cba9a063
                                                                      • Instruction ID: 2aa91f183c3a06c879621255edc498e08f508bd5eea02dd693c783e5881f205f
                                                                      • Opcode Fuzzy Hash: 84a7a200ca55a27a3d058c212b27bfde08dad525f1d8483ad676d170cba9a063
                                                                      • Instruction Fuzzy Hash: 3C5115B39687449FD796DF61C8C77987774EB21328FA5406EE801C5542F6BEAC02CB06
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00FC5C71,SwapMouseButtons,00000004,?), ref: 00FC5CA4
                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00FC5C71,SwapMouseButtons,00000004,?,?,?,?,00FC4F9C), ref: 00FC5CC5
                                                                      • RegCloseKey.KERNELBASE(00000000,?,?,00FC5C71,SwapMouseButtons,00000004,?,?,?,?,00FC4F9C), ref: 00FC5CE7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpenQueryValue
                                                                      • String ID: Control Panel\Mouse
                                                                      • API String ID: 3677997916-824357125
                                                                      • Opcode ID: ddc849608058eeb0a558a594afe4ee9819ee747e291952b2701f89f3549a25e0
                                                                      • Instruction ID: 25a652b44effcee49d04fa99f1dc93b75f8ab902654389e44a2a1e4a12700b63
                                                                      • Opcode Fuzzy Hash: ddc849608058eeb0a558a594afe4ee9819ee747e291952b2701f89f3549a25e0
                                                                      • Instruction Fuzzy Hash: 92113CB5A11619BFDB20CFA8D985FAFBBBCEF04B50B104559F805E7110D632EE81A760
                                                                      APIs
                                                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,01254E9C), ref: 01254E4D
                                                                      • GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,01254E9C), ref: 01254E5C
                                                                      • ReadFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,01254E9C), ref: 01254E7B
                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 01254E81
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseCreateHandleReadSize
                                                                      • String ID:
                                                                      • API String ID: 3919263394-0
                                                                      • Opcode ID: 1bc747adef47f505875bdc0c36de0fea25569a225dd791a93ee1f9257b5a87fb
                                                                      • Instruction ID: 71f2909fc5603a27184a6da9276459aac2588fdc1f7b18dece16c0032860da84
                                                                      • Opcode Fuzzy Hash: 1bc747adef47f505875bdc0c36de0fea25569a225dd791a93ee1f9257b5a87fb
                                                                      • Instruction Fuzzy Hash: F71161B0A24305BFE760EFB8DC82FAEB7ECDB09710F200965B614E7180E6705E409B14
                                                                      APIs
                                                                      • MessageBoxA.USER32(00000000,Executing manually will not work,01258661,00000000), ref: 01258422
                                                                      • MessageBoxA.USER32(00000000,no data,01258661,00000000), ref: 0125849A
                                                                      • GetTickCount.KERNEL32 ref: 01258532
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Message$CountTick
                                                                      • String ID: Executing manually will not work$uPQzHOdQ
                                                                      • API String ID: 1431039135-321689922
                                                                      • Opcode ID: 3c59d941ede2ba40d4d23006507a1c172883b74893cef6c56e37e1d7ea86e82d
                                                                      • Instruction ID: 2afd5c6c43778ac0915d997eafaf49a8c0e9b153bc3cbfc527ac1c22f1f9b2db
                                                                      • Opcode Fuzzy Hash: 3c59d941ede2ba40d4d23006507a1c172883b74893cef6c56e37e1d7ea86e82d
                                                                      • Instruction Fuzzy Hash: B541D2B3D687459FDB96DF61D8C77A877B4EB20324FD1402EA801C1542F6BEAC018B56
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 01038D10
                                                                      • TerminateProcess.KERNEL32(00000000), ref: 01038D17
                                                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 01038EF8
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentFreeLibraryTerminate
                                                                      • String ID:
                                                                      • API String ID: 146820519-0
                                                                      • Opcode ID: 22d030f5c024aca38cc999c9cd4d3878e77a25ede5e3b73f9ce824a9bbfc2756
                                                                      • Instruction ID: e8ad58dcbcbf926c7efcab07a4399272f918a06c4d27554ceb01b12b776c99e8
                                                                      • Opcode Fuzzy Hash: 22d030f5c024aca38cc999c9cd4d3878e77a25ede5e3b73f9ce824a9bbfc2756
                                                                      • Instruction Fuzzy Hash: E3127B71A083419FD714DF28C484B5ABBE5FF88318F04899EF9898B252D735E945CF92
                                                                      APIs
                                                                        • Part of subcall function 00FCF9FB: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FCFA2C
                                                                        • Part of subcall function 00FCF9FB: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FCFA34
                                                                        • Part of subcall function 00FCF9FB: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FCFA3F
                                                                        • Part of subcall function 00FCF9FB: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FCFA4A
                                                                        • Part of subcall function 00FCF9FB: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FCFA52
                                                                        • Part of subcall function 00FCF9FB: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FCFA5A
                                                                        • Part of subcall function 00FCF508: RegisterWindowMessageW.USER32(00000004,?,00FB93EB), ref: 00FCF560
                                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00FB9488
                                                                      • OleInitialize.OLE32 ref: 00FB94A6
                                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 00FF8D75
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                      • String ID:
                                                                      • API String ID: 1986988660-0
                                                                      • Opcode ID: 8ddf34386c98b5b33961e72516fb204f67edbef475fc9d4fb3084f290fe8ab11
                                                                      • Instruction ID: 92c103d25e592570f1123bd8afc4a559a43b7fce5410a075561918d6225565ab
                                                                      • Opcode Fuzzy Hash: 8ddf34386c98b5b33961e72516fb204f67edbef475fc9d4fb3084f290fe8ab11
                                                                      • Instruction Fuzzy Hash: B671CEB4999201CFC7A8EF79E9A965D3BE1FB58300310812AE4CAC7349EB3E4445DF64
                                                                      APIs
                                                                      • SetFilePointerEx.KERNELBASE(00000000,?,00000001,00000000,00000001,00000000,00000000), ref: 00FC1D9F
                                                                      • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,?,00000001), ref: 00FC1DAF
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointer
                                                                      • String ID:
                                                                      • API String ID: 973152223-0
                                                                      • Opcode ID: 74347e016af58425bef7f696f7b9c0c2579f0564072ed2249f0fdd200a1b7669
                                                                      • Instruction ID: 1b8cdc319bb1ce29821049d64d19d94bd808476cce30a6102031d61dc9b7ab50
                                                                      • Opcode Fuzzy Hash: 74347e016af58425bef7f696f7b9c0c2579f0564072ed2249f0fdd200a1b7669
                                                                      • Instruction Fuzzy Hash: 50315A31A0060AEFDB14CF6CC981F99B7B5FB04324F14862AE91597285C771FDA4EB90
                                                                      APIs
                                                                        • Part of subcall function 00FC37B5: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FC38A8
                                                                      • KillTimer.USER32(?,00000001), ref: 00FC36A2
                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FC36B1
                                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 01007D4E
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: IconNotifyShell_Timer$Kill
                                                                      • String ID:
                                                                      • API String ID: 3500052701-0
                                                                      • Opcode ID: f4108aa91466d4617c9653c672b96ec87946aa53ce73ab6106d1b03f92729001
                                                                      • Instruction ID: fd55cbf4648a3949a944404ccb51af965c1fe8927063a8a66c58f45faaf90159
                                                                      • Opcode Fuzzy Hash: f4108aa91466d4617c9653c672b96ec87946aa53ce73ab6106d1b03f92729001
                                                                      • Instruction Fuzzy Hash: 1E31A471904344AFEB73CF248885FEABBFC9F06304F00449ED5D957241D7386A858B51
                                                                      APIs
                                                                      • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00020119,?), ref: 01254813
                                                                      • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,00000100,?,00000000,00000000,00020119,?), ref: 0125483A
                                                                      • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00020119,?), ref: 0125485F
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpenQueryValue
                                                                      • String ID:
                                                                      • API String ID: 3677997916-0
                                                                      • Opcode ID: 712d3af2663db280e53856c2e5cbdd465a33fd0d0744bc0e4c0c6c4841cc4760
                                                                      • Instruction ID: 814fe6d85ecd689555782f695f909182f0acdf47c50b2d1a3f44e827755a905d
                                                                      • Opcode Fuzzy Hash: 712d3af2663db280e53856c2e5cbdd465a33fd0d0744bc0e4c0c6c4841cc4760
                                                                      • Instruction Fuzzy Hash: F9115671E1011D7BDB15EA98DC85EFEB3BCAF59310F004565FA14E7241E6709E848BA1
                                                                      APIs
                                                                      • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,01254C75), ref: 01254C36
                                                                      • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,01254C75), ref: 01254C4E
                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,01254C75), ref: 01254C5A
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseCreateHandleWrite
                                                                      • String ID:
                                                                      • API String ID: 1065093856-0
                                                                      • Opcode ID: ede8a37052e29c92acf420ebedd5ddc2c1ae0e5d40fd7a0a31ce9228561d216e
                                                                      • Instruction ID: 5b492c5af9bd0fe660781a337b0a553424f646df4b2e8de29afc088fd12ee15d
                                                                      • Opcode Fuzzy Hash: ede8a37052e29c92acf420ebedd5ddc2c1ae0e5d40fd7a0a31ce9228561d216e
                                                                      • Instruction Fuzzy Hash: 3E01B171A202057FE724AAA89CC2FBEB7ACDB85B10F510565BA10E21D0E6B05E408660
                                                                      APIs
                                                                      • GetOpenFileNameW.COMDLG32(?), ref: 010071AE
                                                                        • Part of subcall function 00FB119F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FB1192,?), ref: 00FB11BF
                                                                        • Part of subcall function 00FCFDB9: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FCFDD8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Name$Path$FileFullLongOpen
                                                                      • String ID: X
                                                                      • API String ID: 779396738-3081909835
                                                                      • Opcode ID: d4a08d98a796fac84aa0e4a55ab2246e7786b1296673a88a5ed25ded0e6bb7dc
                                                                      • Instruction ID: 54d5dcef63832ab057f29f72585af2b1c686032c4688131e676201e0e47bb64d
                                                                      • Opcode Fuzzy Hash: d4a08d98a796fac84aa0e4a55ab2246e7786b1296673a88a5ed25ded0e6bb7dc
                                                                      • Instruction Fuzzy Hash: 7121C371A002589BDB05DF98DC06BEE7BFDAF49710F00805AE944E7281DBB855899FA1
                                                                      APIs
                                                                      • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,01256CAA), ref: 01256C1F
                                                                      • RegCreateKeyExA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,01256CAA), ref: 01256C53
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CreateOpen
                                                                      • String ID:
                                                                      • API String ID: 436179556-0
                                                                      • Opcode ID: 624aeb0679045ba1c7a12ee306fa3929b98382d6066f187c365e91fd021dcb77
                                                                      • Instruction ID: 4fbcfa37bf60ad9cc2c7d9441ea76aa8b5f167935bf9bb597fcdf08f738e0d4f
                                                                      • Opcode Fuzzy Hash: 624aeb0679045ba1c7a12ee306fa3929b98382d6066f187c365e91fd021dcb77
                                                                      • Instruction Fuzzy Hash: 3E31A471F10209BFEB51EBA9DCC5BAEB7B8EF54300F4084A5E950E3240DB75AE098710
                                                                      APIs
                                                                      • ReadFile.KERNELBASE(00000000,?,00010000,?,00000000,?,00000000,?,?,00FBC03B), ref: 00FC1E6E
                                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000000,00000000,00000001,00008000,00000000,?,00000000,?,?,00FBC03B), ref: 00FC1EA7
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: File$PointerRead
                                                                      • String ID:
                                                                      • API String ID: 3154509469-0
                                                                      • Opcode ID: 612b421569ca46580a4e40ac8fcab0b715f8ba3f301a1df69481b798d611e1cf
                                                                      • Instruction ID: 88f8b82bdebcbca899425029a3b281a04d9f3a08bdbc18e1d78763b544939fe2
                                                                      • Opcode Fuzzy Hash: 612b421569ca46580a4e40ac8fcab0b715f8ba3f301a1df69481b798d611e1cf
                                                                      • Instruction Fuzzy Hash: 4E214439600706AFD720CF59C981F66B7F9FB49720F10882DE99A87A81C7B1B954DB60
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,00FBC025,?,00008000), ref: 00FC1F16
                                                                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,00000000,?,?,00FBC025,?,00008000), ref: 01007483
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: 59b6256a008f111a671432047d012e3503f962ad4976075a065be99bb48d8713
                                                                      • Instruction ID: 6a5111e2850cea55d93efe358f2d32707e888b6a735caefb057349ef803962af
                                                                      • Opcode Fuzzy Hash: 59b6256a008f111a671432047d012e3503f962ad4976075a065be99bb48d8713
                                                                      • Instruction Fuzzy Hash: 58019231245225B6F3314A6ACD0FF977F99EF03B70F218208BE985A1E2CBB45464DB90
                                                                      APIs
                                                                      • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,00FE926A,FF8BC369,00000000,00000002,00000000), ref: 00FE91F4
                                                                      • GetLastError.KERNEL32(?,00FE926A,FF8BC369,00000000,00000002,00000000,?,00FE598F,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00FD6AFC), ref: 00FE91FE
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer
                                                                      • String ID:
                                                                      • API String ID: 2976181284-0
                                                                      • Opcode ID: 4454be45479264870ba7ee86c1dce77613bb4cc0cd31ea2b42e12c7320d8a1c6
                                                                      • Instruction ID: 75e832f98b06fddcc34734823abe57566ea1c5b24e0cd83fc7edcdfb4fd8e036
                                                                      • Opcode Fuzzy Hash: 4454be45479264870ba7ee86c1dce77613bb4cc0cd31ea2b42e12c7320d8a1c6
                                                                      • Instruction Fuzzy Hash: 90012833A182557BCB159F9ADC0586E3B2AEF85330B240248F81097190EAB5DD01E7A0
                                                                      APIs
                                                                      • IsThemeActive.UXTHEME ref: 00FCFC4A
                                                                        • Part of subcall function 00FCFC98: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00FCFCAD
                                                                        • Part of subcall function 00FCFC98: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00FCFCC4
                                                                        • Part of subcall function 00FC2D33: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FC2D63
                                                                        • Part of subcall function 00FC2D33: IsDebuggerPresent.KERNEL32 ref: 00FC2D76
                                                                        • Part of subcall function 00FC2D33: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00FC2DE2
                                                                        • Part of subcall function 00FC2D33: SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 00FC2E63
                                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00FCFC84
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                      • String ID:
                                                                      • API String ID: 1550534281-0
                                                                      • Opcode ID: 90c325accc6c373e64cbb18598a950dcc6b021cc0ae214b0bec75f40ae08fbcc
                                                                      • Instruction ID: e4742b3dc415f82377e788f0b153638959fdcdee9166d038572a2e108a6ae2b2
                                                                      • Opcode Fuzzy Hash: 90c325accc6c373e64cbb18598a950dcc6b021cc0ae214b0bec75f40ae08fbcc
                                                                      • Instruction Fuzzy Hash: E2F0E971548308AFD720AB70EE4BF1C7BA1B710711F008819F5C54A1CADBBF9160DB84
                                                                      APIs
                                                                      • ReadFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,01254E9C), ref: 01254E7B
                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 01254E81
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CloseFileHandleRead
                                                                      • String ID:
                                                                      • API String ID: 2331702139-0
                                                                      • Opcode ID: 5eecda559ff69586c3b6a6d391044200ef38843fb35e84923458a989e5f5e4c6
                                                                      • Instruction ID: 38820036c8ce327313fa1938cd58fc46bf44956281c03d406e6fcfea38dbf3fe
                                                                      • Opcode Fuzzy Hash: 5eecda559ff69586c3b6a6d391044200ef38843fb35e84923458a989e5f5e4c6
                                                                      • Instruction Fuzzy Hash: F5E04FB5A28204BFE744EFA4DCC1EBDB7ECEB84300F604866B504D2100DA709D409B20
                                                                      APIs
                                                                      • GetFileAttributesA.KERNEL32(00000000,?,?,01256F6D,00000000,012570D4,?,?,00000000,00000000), ref: 012547A5
                                                                      • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,?,?,01256F6D,00000000,012570D4,?,?,00000000,00000000), ref: 012547C2
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: 150071e8d115d48b6e860e46511f068db359f69ce08f9d5d34f1670f96483210
                                                                      • Instruction ID: a7e9df4bbb13064474a79082d70697976f606c066d858bdd2a7ac06827afd6d3
                                                                      • Opcode Fuzzy Hash: 150071e8d115d48b6e860e46511f068db359f69ce08f9d5d34f1670f96483210
                                                                      • Instruction Fuzzy Hash: 46D0A790B2122317DB5431BC3CC6EAE818C0B16970B110360FB10E3182DE544DC20195
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(00000000,01258165,00000000,01258180,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 01257E07
                                                                      • TerminateProcess.KERNEL32(00000000,00000000,01258165,00000000,01258180,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 01257E0D
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentTerminate
                                                                      • String ID:
                                                                      • API String ID: 2429186680-0
                                                                      • Opcode ID: b11399cddf9350ece28e91c1209740a3cf97649afd2b7b8c8d81269606c38880
                                                                      • Instruction ID: e06887d6073adda99f67f4f4145a492684992de4e2204d7c2035f06be2ca41f8
                                                                      • Opcode Fuzzy Hash: b11399cddf9350ece28e91c1209740a3cf97649afd2b7b8c8d81269606c38880
                                                                      • Instruction Fuzzy Hash: A290024466820713D95832B00945FAE60085F60902FC10850F308A54844C9C90900069
                                                                      APIs
                                                                      • CloseHandle.KERNELBASE(00000000,00000000,?,?,00FE83FC,?,01079910,0000000C), ref: 00FE8534
                                                                      • GetLastError.KERNEL32(?,00FE83FC,?,01079910,0000000C), ref: 00FE853E
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CloseErrorHandleLast
                                                                      • String ID:
                                                                      • API String ID: 918212764-0
                                                                      • Opcode ID: 6c70fefd49dc4d799ef365e4b3c7117c4beeecbac1ec25e158c69608a172fb9f
                                                                      • Instruction ID: fb365617e2db6fa8f428aba1282d36ee9f5663936652a8f9671c0e6692726adf
                                                                      • Opcode Fuzzy Hash: 6c70fefd49dc4d799ef365e4b3c7117c4beeecbac1ec25e158c69608a172fb9f
                                                                      • Instruction Fuzzy Hash: 32010C32E056E01AD234723A6D4577E77868F81B78F294129F82C971C3DE6DCC82A261
                                                                      APIs
                                                                      • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,0123C638), ref: 0123C2D4
                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,0123C638), ref: 0123C2FB
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 2087232378-0
                                                                      • Opcode ID: a18028a8f3d8eabaeec14eea95c656aaa3b43afc80694adb3453432e24d423c5
                                                                      • Instruction ID: bbfbdd775bd9ef402cc60817944d66653460979f23c1f490548ed71792082a0a
                                                                      • Opcode Fuzzy Hash: a18028a8f3d8eabaeec14eea95c656aaa3b43afc80694adb3453432e24d423c5
                                                                      • Instruction Fuzzy Hash: ACF0A7F3F2073156EB2156AD4C81B6299859FC6BA0F154173FA4CFF3C9D6A1481142A0
                                                                      APIs
                                                                      • CharLowerBuffW.USER32(?,?), ref: 0102016F
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: BuffCharLower
                                                                      • String ID:
                                                                      • API String ID: 2358735015-0
                                                                      • Opcode ID: 40bf949e1a33d12b93c55d42c0bf6f370ff29a37b31dcce4b22f8a58120e48dc
                                                                      • Instruction ID: c9ddf85d8ac9e0d89d27e0a207fedf22782d9fe28ac0332b9b1922c6352279c4
                                                                      • Opcode Fuzzy Hash: 40bf949e1a33d12b93c55d42c0bf6f370ff29a37b31dcce4b22f8a58120e48dc
                                                                      • Instruction Fuzzy Hash: B741A1B6A00319AFDB11DFA8CC809EEB7F9EF44310F20856FF95697255EB709A448B50
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: EnumWindows
                                                                      • String ID:
                                                                      • API String ID: 1129996299-0
                                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                      • Instruction ID: 6c53bae69a097cfb0d9810db82707785476f3ced3f8705fe22ac9e2947a4556f
                                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                      • Instruction Fuzzy Hash: 9731E2B1A00105DFC718CF59D484A6DFBA6FB49310F6886A6E409CB356EB71EDC1EB80
                                                                      APIs
                                                                        • Part of subcall function 00FC290F: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00FC27DC,?,?,00FC058E,?,00000001), ref: 00FC291B
                                                                        • Part of subcall function 00FC290F: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00FC292D
                                                                        • Part of subcall function 00FC290F: FreeLibrary.KERNEL32(00000000,?,?,00FC27DC,?,?,00FC058E,?,00000001), ref: 00FC293F
                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00FC058E,?,00000001), ref: 00FC27FC
                                                                        • Part of subcall function 00FC28D8: LoadLibraryA.KERNEL32(kernel32.dll,?,?,010077B4,?,?,00FC058E,?,00000001), ref: 00FC28E1
                                                                        • Part of subcall function 00FC28D8: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00FC28F3
                                                                        • Part of subcall function 00FC28D8: FreeLibrary.KERNEL32(00000000,?,?,010077B4,?,?,00FC058E,?,00000001), ref: 00FC2906
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressFreeProc
                                                                      • String ID:
                                                                      • API String ID: 2632591731-0
                                                                      • Opcode ID: fbd2cbd44c58797524e373662b183a48e5eb68a774f2322fd65457a3d0a14a36
                                                                      • Instruction ID: b2a5f81e71cb50efd5241091dc05f43629193db152ff8862dc7bf73ae18e4e66
                                                                      • Opcode Fuzzy Hash: fbd2cbd44c58797524e373662b183a48e5eb68a774f2322fd65457a3d0a14a36
                                                                      • Instruction Fuzzy Hash: 24110432600206ABDB64BF64CE43FAD77A5EF94710F50842EF482AA1C1EE799A05A750
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CountTick
                                                                      • String ID:
                                                                      • API String ID: 536389180-0
                                                                      • Opcode ID: 597749b9c1834c3e4a511af67be6513dbadd4ce49a27b2bca116fa7848ce6b10
                                                                      • Instruction ID: 1e864e98eaa01e25771d5d2d28e56738952037880dfd2d4ca53a3afad2d63b74
                                                                      • Opcode Fuzzy Hash: 597749b9c1834c3e4a511af67be6513dbadd4ce49a27b2bca116fa7848ce6b10
                                                                      • Instruction Fuzzy Hash: 4711F1B4E1420AAFCB44DF99D8819AEBBF8FB48710F518469ED14A7340D734AE118B51
                                                                      APIs
                                                                      • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 01256D26
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 89b6fba270f4f6a47129fd476a07cfd1ab684a6d332d97ffa145a61918c1e987
                                                                      • Instruction ID: 904e1e97a3cbacf3bfe936793d6f92e302fdd21db12108aa836d8e792f15c2ff
                                                                      • Opcode Fuzzy Hash: 89b6fba270f4f6a47129fd476a07cfd1ab684a6d332d97ffa145a61918c1e987
                                                                      • Instruction Fuzzy Hash: FFF0A475B00109ABD750EAADECC0FBABBEC9F59250F048165FE18D7340D6719D008BA0
                                                                      APIs
                                                                      • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 01256D26
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: a80400a3fc9b2e2b6db2f134cdc82aca6f267dffc5661afd40d6916a5f9470f4
                                                                      • Instruction ID: 146f4040fb3802cb53d7704dc0431e5584eff6c206797a3bf4eb8750ec860a89
                                                                      • Opcode Fuzzy Hash: a80400a3fc9b2e2b6db2f134cdc82aca6f267dffc5661afd40d6916a5f9470f4
                                                                      • Instruction Fuzzy Hash: C5F0C875A00109ABC750EB9DECC0FAFBBEC9F59250F048155FE18D7340D6719D008BA0
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00FE2D00,00000001,00000364,?,?,?,00FE26D1,00FE281A,?,?,00FBFC79,?), ref: 00FE28BD
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 772e5ab4fe6d9ecf1f0305992c3dced6d69e6340510aae311f5c6785bbed951d
                                                                      • Instruction ID: b71cb5ff76eeff0fda350788d76febbb67714a18c793a39b94a66a4fa3645c68
                                                                      • Opcode Fuzzy Hash: 772e5ab4fe6d9ecf1f0305992c3dced6d69e6340510aae311f5c6785bbed951d
                                                                      • Instruction Fuzzy Hash: EEF0B436A0126567DBA15A6B9C06B6E374DBF40770B194163B84496194EF34DA00A6F2
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(00000000,?,00000001,?,00FD0445,?,?,00FBFA72,00000000,?,?,?,00FB1188,?), ref: 00FE2860
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 734c4687f479134b0604494e30b61ed8b68b9f905b7dc4d4b979530891612502
                                                                      • Instruction ID: e8cc073c1052550e3eaaac77cf20c6422c64fa776bd670343e60fc7c0b092182
                                                                      • Opcode Fuzzy Hash: 734c4687f479134b0604494e30b61ed8b68b9f905b7dc4d4b979530891612502
                                                                      • Instruction Fuzzy Hash: 25E09B315412A167D6B136675C0575F3A4DBF417B0F194123BC8596191FB24DE01B2F1
                                                                      APIs
                                                                      • LoadStringA.USER32(00000000,00010000,?,00001000), ref: 01240ABB
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: LoadString
                                                                      • String ID:
                                                                      • API String ID: 2948472770-0
                                                                      • Opcode ID: 98cb9e290b6fcda0473899373f779afeb580b28c0de553bc535e0dfee71ead7e
                                                                      • Instruction ID: 4f428741ffd1d3bc243332327247c144908215d271c82e57fbe1c9de64326e47
                                                                      • Opcode Fuzzy Hash: 98cb9e290b6fcda0473899373f779afeb580b28c0de553bc535e0dfee71ead7e
                                                                      • Instruction Fuzzy Hash: 60F0A0B1720111DBCB14EA9CC8C0FA672DC8F88250B048161B708DB348EB60DC8887A2
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b3dc83447941d27beedd6c1ddd04eda31103d438525c026e7ed7c5086397f902
                                                                      • Instruction ID: 1cc29e10426327ab2d3eeb294143418d360543f2271cd8afd35ee342c5b5cc95
                                                                      • Opcode Fuzzy Hash: b3dc83447941d27beedd6c1ddd04eda31103d438525c026e7ed7c5086397f902
                                                                      • Instruction Fuzzy Hash: 75F0A071401302CFD7759F64D590916B7E5FF0032931489BEE1C682651C336A840EF50
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: ClearVariant
                                                                      • String ID:
                                                                      • API String ID: 1473721057-0
                                                                      • Opcode ID: 2179922af00d2afe319f4a0b9f92efff20fe65351e0ef862f742f0bf3c4dd25a
                                                                      • Instruction ID: aad3d216edfc9802d8e7a613dd4593484762001e919009264653da207932e46d
                                                                      • Opcode Fuzzy Hash: 2179922af00d2afe319f4a0b9f92efff20fe65351e0ef862f742f0bf3c4dd25a
                                                                      • Instruction Fuzzy Hash: EBF0E5B2E582495ADB309B669C04BB1BBC4AF01321F10042ADAD5C21D1DFB95490BB61
                                                                      APIs
                                                                      • GetModuleFileNameA.KERNEL32(00FB0000,?,00000105), ref: 0123FF47
                                                                        • Part of subcall function 012401BD: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 012401D8
                                                                        • Part of subcall function 012401BD: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 012401F6
                                                                        • Part of subcall function 012401BD: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 01240214
                                                                        • Part of subcall function 012401BD: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 01240232
                                                                        • Part of subcall function 012401BD: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,012402C1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 0124027B
                                                                        • Part of subcall function 012401BD: RegQueryValueExA.ADVAPI32(?,0124043D,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,012402C1,?,80000001), ref: 01240299
                                                                        • Part of subcall function 012401BD: RegCloseKey.ADVAPI32(?,012402C8,00000000,00000000,00000005,00000000,012402C1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 012402BB
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Open$FileModuleNameQueryValue$Close
                                                                      • String ID:
                                                                      • API String ID: 2796650324-0
                                                                      • Opcode ID: 4f6f7f1076de1bd117e32dae873e78de734a710e1bc72a608b831ebaeac8ce49
                                                                      • Instruction ID: 59146572d6205f43509c5a8a6c10e249173996c2febe69538267972ba967fa63
                                                                      • Opcode Fuzzy Hash: 4f6f7f1076de1bd117e32dae873e78de734a710e1bc72a608b831ebaeac8ce49
                                                                      • Instruction Fuzzy Hash: 8BE06DB1A103118BCB14DE5CD9C0A9233D8AB48654F004561BD58CF386D771D9508BD1
                                                                      APIs
                                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FCFDD8
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: LongNamePath
                                                                      • String ID:
                                                                      • API String ID: 82841172-0
                                                                      • Opcode ID: bce57d9d355e6c3a05ba9816fbea29dd103372a5d5abf643295278cb1d35744f
                                                                      • Instruction ID: 9fd9e02b11549b09c95d957c6ec20749b90c38e0963877007f66e4d6766eed55
                                                                      • Opcode Fuzzy Hash: bce57d9d355e6c3a05ba9816fbea29dd103372a5d5abf643295278cb1d35744f
                                                                      • Instruction Fuzzy Hash: 2FE0CD7690122857C721E5989C05FFA77DDDF897A0F0401B5FD0CD7208D965AC8097D1
                                                                      APIs
                                                                      • GetForegroundWindow.USER32 ref: 00FC3AA9
                                                                        • Part of subcall function 00FC4E5A: GetWindowLongW.USER32(00000000,000000EB), ref: 00FC4E6B
                                                                        • Part of subcall function 00FC4B74: GetCursorPos.USER32(?), ref: 00FC4B88
                                                                        • Part of subcall function 00FC4B74: ScreenToClient.USER32(00000000,?), ref: 00FC4BA5
                                                                        • Part of subcall function 00FC4B74: GetAsyncKeyState.USER32(00000001), ref: 00FC4BCE
                                                                        • Part of subcall function 00FC4B74: GetAsyncKeyState.USER32(00000002), ref: 00FC4BE8
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: AsyncStateWindow$ClientCursorForegroundLongScreen
                                                                      • String ID:
                                                                      • API String ID: 4074248120-0
                                                                      • Opcode ID: 940dcfa8a2f7a0365b5c708574fe874e8960bd7363b91866be7dc988eb6ba053
                                                                      • Instruction ID: 1b324bc8092346fc6a788fa81c8ec57a19bbc6cee6e60d1d4708cb9653e014b2
                                                                      • Opcode Fuzzy Hash: 940dcfa8a2f7a0365b5c708574fe874e8960bd7363b91866be7dc988eb6ba053
                                                                      • Instruction Fuzzy Hash: CFD05E346015228BC924AA189956F1D3691BB457307044244F4A58B2E5CB695D92E7D5
                                                                      APIs
                                                                      • GetFileAttributesA.KERNEL32(00000000,?,0125432F,00000000,0125673F,012568E5,?,c:\,012568E5,?,c:\), ref: 01242738
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: 4572904268e265fd193fcb2e56680a69fd8facc4a158caf36c05ddde75ad2af6
                                                                      • Instruction ID: f16b5ba261f16a9a0ab0c054a11fdcc165527b17133c8f579d0e6cfa93f952cf
                                                                      • Opcode Fuzzy Hash: 4572904268e265fd193fcb2e56680a69fd8facc4a158caf36c05ddde75ad2af6
                                                                      • Instruction Fuzzy Hash: 3DC08CA0B312020B2F5CA1BE3CC05AA028C496A0317201A21F278D21E2D71190572410
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(00000000,00000000,?,00FF062E,?,?,00000000,?,00FF062E,00000000,0000000C), ref: 00FF02E1
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: 39c2e80597082683e27958f01a6c6d24a15c9b2ed2f5fd38c8f274155efe986a
                                                                      • Instruction ID: 60f6735c98fb9ea6ef1f38621475e5ddf80e56849d73d7d90c581bb6f83b4ad0
                                                                      • Opcode Fuzzy Hash: 39c2e80597082683e27958f01a6c6d24a15c9b2ed2f5fd38c8f274155efe986a
                                                                      • Instruction Fuzzy Hash: B3D06C3200010DBBDF128E84DD46EDA3BAAFB48714F014000BE5856020C736E821AB90
                                                                      APIs
                                                                      • RtlFreeHeap.NTDLL(00000000,00000000,?,00FBFC79,?,?,00FB111E), ref: 00FE280A
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3298025750-0
                                                                      • Opcode ID: 67f25f56531833681cf29ac3037bf53598744d75c46dae52cc99524fdddd4a57
                                                                      • Instruction ID: 15dc927193544548f4106843d61dc8048b7ecc320a0bd7d74f791117076578cc
                                                                      • Opcode Fuzzy Hash: 67f25f56531833681cf29ac3037bf53598744d75c46dae52cc99524fdddd4a57
                                                                      • Instruction Fuzzy Hash: 16D0A73100014477DB222A66EC05B6E3E5DAB80324F040020B50804071E7358690E794
                                                                      APIs
                                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,?,0125433A,00000000,0125673F,012568E5,?,c:\,012568E5,?,c:\), ref: 01242A52
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectory
                                                                      • String ID:
                                                                      • API String ID: 4241100979-0
                                                                      • Opcode ID: 2afb928ea0769a03e65cdb2334b4541331df32d5787a6e4dcd60dacd8e68de1d
                                                                      • Instruction ID: 784fd4b10e26559f7e03c15c2bd2c145b51a5df856501fc54abce92be79425c6
                                                                      • Opcode Fuzzy Hash: 2afb928ea0769a03e65cdb2334b4541331df32d5787a6e4dcd60dacd8e68de1d
                                                                      • Instruction Fuzzy Hash: B2B012D3B743412BEF1035F83CC5F3E518CD769806F100C71F245D6142D567C8550011
                                                                      APIs
                                                                        • Part of subcall function 00FC1EE8: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,00FBC025,?,00008000), ref: 00FC1F16
                                                                      • GetLastError.KERNEL32(00000002,00000000), ref: 01028195
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorFileLast
                                                                      • String ID:
                                                                      • API String ID: 1214770103-0
                                                                      • Opcode ID: b1c9d0da0675eff5bb776607d660deab243165f2e139fd420dfb645e23ab18da
                                                                      • Instruction ID: ccfd1800201f46268bd3a2147c75f1c60e527c135cd0cec9b9d943673b69fdbc
                                                                      • Opcode Fuzzy Hash: b1c9d0da0675eff5bb776607d660deab243165f2e139fd420dfb645e23ab18da
                                                                      • Instruction Fuzzy Hash: 6291B0342043129FD755EF28C891BADB7E1BF89310F04856EF9855B292CB38AD45DF42
                                                                      APIs
                                                                      • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 0123C4E2
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID:
                                                                      • API String ID: 4275171209-0
                                                                      • Opcode ID: d03a3046163f6184b9b7679b7e0f3bebce94dd28af840b4081a31fe43a55cf8b
                                                                      • Instruction ID: 5e8ea013345ea8871791495e7469f0dede15669acab781dfc653fd311c207675
                                                                      • Opcode Fuzzy Hash: d03a3046163f6184b9b7679b7e0f3bebce94dd28af840b4081a31fe43a55cf8b
                                                                      • Instruction Fuzzy Hash: 1921CDB52143469FC750CF2CC880A6AB7E4FF88350B14892AFA99EB344D330E954CB62
                                                                      APIs
                                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0123C3FA
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: FreeVirtual
                                                                      • String ID:
                                                                      • API String ID: 1263568516-0
                                                                      • Opcode ID: 868db0d6804e96216372af0c7d2330db006d09f73424ef6d07a75df0a5e5ee91
                                                                      • Instruction ID: 981df3514dd58f67128139bcf12d8638e66018face6ad65e29be00ad8d59bd4f
                                                                      • Opcode Fuzzy Hash: 868db0d6804e96216372af0c7d2330db006d09f73424ef6d07a75df0a5e5ee91
                                                                      • Instruction Fuzzy Hash: DB2190B4214302AFC320DF1CD884A1ABBE0FB98360F24896AE6D8D7351D371E961CF56
                                                                      APIs
                                                                      • VirtualFree.KERNEL32(?,?,00004000), ref: 0123C599
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: FreeVirtual
                                                                      • String ID:
                                                                      • API String ID: 1263568516-0
                                                                      • Opcode ID: 3e22dc52ce3fe1480b08218084e6d26e5182a57910f25d76e7cc0191749c2ddf
                                                                      • Instruction ID: 9f6137f4d8d615eb7a2718a7f03688c6de3ef592a3977aa28e1b18578b437408
                                                                      • Opcode Fuzzy Hash: 3e22dc52ce3fe1480b08218084e6d26e5182a57910f25d76e7cc0191749c2ddf
                                                                      • Instruction Fuzzy Hash: 2921E0B5215302DFC751CF2CE880A1AB7E4FF89354B14496AE594EB345D331E958CFA2
                                                                      APIs
                                                                        • Part of subcall function 01254BF1: CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,01254C75), ref: 01254C36
                                                                        • Part of subcall function 01254BF1: WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,01254C75), ref: 01254C4E
                                                                        • Part of subcall function 01254BF1: CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,01254C75), ref: 01254C5A
                                                                      • Sleep.KERNEL32(00000002,00000000,01254CF6), ref: 01254CD6
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseCreateHandleSleepWrite
                                                                      • String ID:
                                                                      • API String ID: 1443029356-0
                                                                      • Opcode ID: b99a7a783a4bdcb9f32e12afd13eae9846701ce81228c977282d2d9b02870111
                                                                      • Instruction ID: 222886fb682cc61d693c167715754c931f5fbd95d73f40a797daa6a53bc853dd
                                                                      • Opcode Fuzzy Hash: b99a7a783a4bdcb9f32e12afd13eae9846701ce81228c977282d2d9b02870111
                                                                      • Instruction Fuzzy Hash: DEF0A470A24649AFD741FBA8D981AADF7F8EB95700F5040B5E804E3690EB355E41C711
                                                                      APIs
                                                                        • Part of subcall function 01254BF1: CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,01254C75), ref: 01254C36
                                                                        • Part of subcall function 01254BF1: WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,01254C75), ref: 01254C4E
                                                                        • Part of subcall function 01254BF1: CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,01254C75), ref: 01254C5A
                                                                      • Sleep.KERNEL32(00000002,00000000,01254CF6), ref: 01254CD6
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.0000000001239000.00000040.00000020.00020000.00000000.sdmp, Offset: 01239000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_1239000_file.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseCreateHandleSleepWrite
                                                                      • String ID:
                                                                      • API String ID: 1443029356-0
                                                                      • Opcode ID: 7c7192be15a1d739495aac008c9d772b06e278ed7ede4af4e18e06da564ceca1
                                                                      • Instruction ID: ef96dfdb290f43ee4f482be27ca9f78b670e4f3dbf1475c905d9b291d4214e94
                                                                      • Opcode Fuzzy Hash: 7c7192be15a1d739495aac008c9d772b06e278ed7ede4af4e18e06da564ceca1
                                                                      • Instruction Fuzzy Hash: 27F0AFB0A20249FFDB41FBA4E981ABDFBF8EB88300F5144B5E804E3650EA355E418B00
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1572820171.000000000125D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_125d000_file.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: daf07dfe0449386a21cd617d80c280d79caee84e403b1fdd0f7a77803a7c3103
                                                                      • Instruction ID: c6963657697c7dcb935e42350dd8096b91dddfc55392ff8e7741ff352f3b361f
                                                                      • Opcode Fuzzy Hash: daf07dfe0449386a21cd617d80c280d79caee84e403b1fdd0f7a77803a7c3103
                                                                      • Instruction Fuzzy Hash: 5C31F521624A03EAEF214AACDC44BA37B5CFF05224F240236E795974C2D770B9D4C7A5
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?,76528FB0,?,00000000), ref: 0102A1A8
                                                                      • GetFileAttributesW.KERNEL32(?), ref: 0102A1E6
                                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 0102A200
                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0102A218
                                                                      • FindClose.KERNEL32(00000000), ref: 0102A223
                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0102A23F
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0102A28F
                                                                      • SetCurrentDirectoryW.KERNEL32(010779A0), ref: 0102A2AD
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0102A2B7
                                                                      • FindClose.KERNEL32(00000000), ref: 0102A2C4
                                                                      • FindClose.KERNEL32(00000000), ref: 0102A2D6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                      • String ID: *.*
                                                                      • API String ID: 1409584000-438819550
                                                                      • Opcode ID: 7c6eb87bfd82c88b86fe0a444fad552f8e354b3ed08f7cf0cb7023ef594bf446
                                                                      • Instruction ID: 4382c2758bccb1d1076907121a4b46c1588561a9360d522286d5439d030845b6
                                                                      • Opcode Fuzzy Hash: 7c6eb87bfd82c88b86fe0a444fad552f8e354b3ed08f7cf0cb7023ef594bf446
                                                                      • Instruction Fuzzy Hash: 44310576701239AFDB209EB8DC48ADE77EC9F16260F040196E994E3150EF36DA488B64
                                                                      APIs
                                                                        • Part of subcall function 00FB119F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FB1192,?), ref: 00FB11BF
                                                                      • GetFileAttributesW.KERNEL32(?), ref: 0101E1C0
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0101E1FD
                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0101E24D
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0101E25E
                                                                      • FindClose.KERNEL32(00000000), ref: 0101E275
                                                                      • FindClose.KERNEL32(00000000), ref: 0101E27E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                      • String ID: \*.*
                                                                      • API String ID: 2649000838-1173974218
                                                                      • Opcode ID: 84c1d31d924bb2ce8862806af642935ed0ceb0c41261cfdafd04b303f111fdd9
                                                                      • Instruction ID: 0597514e17b9fae1452be3f3939170b0d52a24abf2348c88bc89f7613e52d29c
                                                                      • Opcode Fuzzy Hash: 84c1d31d924bb2ce8862806af642935ed0ceb0c41261cfdafd04b303f111fdd9
                                                                      • Instruction Fuzzy Hash: 1B318F71008345ABC302EF64CD958EFB7E8BE65310F444E2DF8E582091EB299A09DB52
                                                                      APIs
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,01012308), ref: 010121DE
                                                                      • CloseHandle.KERNEL32(?,?,01012308), ref: 010121F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                                      • String ID:
                                                                      • API String ID: 81990902-0
                                                                      • Opcode ID: 32e0b2bb899272f22a66e60119dcee064eec393a3ae017931c8d295e3d3d8d61
                                                                      • Instruction ID: 169c26d28e889f377777654133929435199ad9e1729b4bd7b26266876b9a3dc5
                                                                      • Opcode Fuzzy Hash: 32e0b2bb899272f22a66e60119dcee064eec393a3ae017931c8d295e3d3d8d61
                                                                      • Instruction Fuzzy Hash: E3E04F76104600AFF7352B54FD06F727BE9EB04310F24C82EF6A581475DB66AC90EB10
                                                                      APIs
                                                                      • CharUpperBuffW.USER32(?,?), ref: 01040288
                                                                      • IsWindowVisible.USER32(?), ref: 010402DF
                                                                      • IsWindowEnabled.USER32(?), ref: 01040331
                                                                        • Part of subcall function 01012E91: SendMessageW.USER32(?,00000188,00000000,00000000), ref: 01012F15
                                                                        • Part of subcall function 01012E91: SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 01012F28
                                                                        • Part of subcall function 01012E91: SendMessageW.USER32(?,00000189,?,00000000), ref: 01012F58
                                                                        • Part of subcall function 01012A02: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 01012A0D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$BuffCharEnabledUpperVisible
                                                                      • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                      • API String ID: 409549560-45149045
                                                                      • Opcode ID: 67737ac2b6aa72945ec59f77fa04ad4074100d61b9003e0c0ed78490779a157d
                                                                      • Instruction ID: 28e46bd57d8c8667779f662224952569ff56d3820225b79270f3d0081453959c
                                                                      • Opcode Fuzzy Hash: 67737ac2b6aa72945ec59f77fa04ad4074100d61b9003e0c0ed78490779a157d
                                                                      • Instruction Fuzzy Hash: 6A02C9B46042018FDB14EF18C494AAE7BE1BF94344F1484ADF9CA6B3A6CB35DD46CB46
                                                                      APIs
                                                                        • Part of subcall function 0103D398: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0103C0AE,?,?), ref: 0103D3B5
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0103C0F4
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0103C172
                                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 0103C20A
                                                                      • RegCloseKey.ADVAPI32(?), ref: 0103C27E
                                                                      • RegCloseKey.ADVAPI32(?), ref: 0103C29C
                                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0103C2F2
                                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0103C304
                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 0103C322
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 0103C383
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0103C394
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                      • API String ID: 1742008743-4033151799
                                                                      • Opcode ID: a9ebb9a401a2a5d38538cccfb7ba9980521dc03b4ac8f4185f90f6cf8ae51eac
                                                                      • Instruction ID: db87d3ebaef9bb89d8439900fcb194a64bed4f991af1b76eeb0cf76d8c72960d
                                                                      • Opcode Fuzzy Hash: a9ebb9a401a2a5d38538cccfb7ba9980521dc03b4ac8f4185f90f6cf8ae51eac
                                                                      • Instruction Fuzzy Hash: C4C1D335204201AFE710DF68C994F2ABBE5BF85308F14849DF49A9B392CB76E945CF81
                                                                      APIs
                                                                      • LoadStringW.USER32(00000066,?,00000FFF), ref: 01024189
                                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 010241AA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: LoadString
                                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                      • API String ID: 2948472770-3080491070
                                                                      • Opcode ID: c18ee6754d960409ca089cbf638e9558a5b50fe3aee0129369f534ef9eb0eb8d
                                                                      • Instruction ID: 965f24e1faec5404131f96289e702a4488e92d5073424294a5ed48524104ffac
                                                                      • Opcode Fuzzy Hash: c18ee6754d960409ca089cbf638e9558a5b50fe3aee0129369f534ef9eb0eb8d
                                                                      • Instruction Fuzzy Hash: 31518E71D0020ABADB15EBE1CD86EEEB7B9AF18300F5041A5F545A2051DB392F99DF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                      • API String ID: 0-1603158881
                                                                      • Opcode ID: c36684c868ee52f1c20f07a1d3f03c844ea9a7d77bb78fd7e502f35de6ca2b00
                                                                      • Instruction ID: 7ea6ca020b1f4728f2f7549d911ac07a9b4b977fd963cc68dfe191dbeb486c8a
                                                                      • Opcode Fuzzy Hash: c36684c868ee52f1c20f07a1d3f03c844ea9a7d77bb78fd7e502f35de6ca2b00
                                                                      • Instruction Fuzzy Hash: 5CD14B71F00202EBDB18DFA8C880BEDB7B5BF04304F54C169E99AD7215EB39A949DB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: api-ms-$ext-ms-
                                                                      • API String ID: 0-537541572
                                                                      • Opcode ID: ffe178d6c9664f20884cd6406aa33a69fccf65244bf79b526ce18a4ea29a176d
                                                                      • Instruction ID: ff9e7a6dc37ecf78da8f7b090878088930caea6d72a3c11b7f362f061644d1d5
                                                                      • Opcode Fuzzy Hash: ffe178d6c9664f20884cd6406aa33a69fccf65244bf79b526ce18a4ea29a176d
                                                                      • Instruction Fuzzy Hash: 3021D576E01215BBCB328B649D81B2A376AAF217B0F1C0212FC45A7384D635FD40A7E0
                                                                      APIs
                                                                      • GetDC.USER32(00000000), ref: 010161F7
                                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 01016208
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0101620F
                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 01016217
                                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0101622E
                                                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 01016240
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: CapsDevice$Release
                                                                      • String ID:
                                                                      • API String ID: 1035833867-0
                                                                      • Opcode ID: 484fd545d37d969d86d77f41374a8713dfe0ba0c074f90655f469197ca866827
                                                                      • Instruction ID: b01c5bedfd0599e811d408a1a22bc7b98110ba52fdc9a0cc79e9e711bf86bf86
                                                                      • Opcode Fuzzy Hash: 484fd545d37d969d86d77f41374a8713dfe0ba0c074f90655f469197ca866827
                                                                      • Instruction Fuzzy Hash: CE0188B5E00308BBEB109BE59D45A5EBFB8EB58351F0440A6FE48A7245D6759910CF50
                                                                      APIs
                                                                        • Part of subcall function 01013E94: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 01013EB2
                                                                        • Part of subcall function 01013E94: GetWindowThreadProcessId.USER32(?,00000000), ref: 01013EC3
                                                                        • Part of subcall function 01013E94: GetCurrentThreadId.KERNEL32 ref: 01013ECA
                                                                        • Part of subcall function 01013E94: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,?,?,?,0101368B), ref: 01013ED1
                                                                      • GetFocus.USER32 ref: 0101404B
                                                                      • GetParent.USER32(00000000), ref: 01014068
                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 010140A7
                                                                      • EnumChildWindows.USER32(?,01014110), ref: 010140CF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows
                                                                      • String ID: %s%d
                                                                      • API String ID: 2776554818-1110647743
                                                                      • Opcode ID: e1a03346dc1920f4a0fafab4e4d2cd90eb95e0176095962fdb5d50a0e09cbfb3
                                                                      • Instruction ID: 660861a9cf6ec546fe2785e2669abbf02639615ba4a2cfe2002653ca9782160b
                                                                      • Opcode Fuzzy Hash: e1a03346dc1920f4a0fafab4e4d2cd90eb95e0176095962fdb5d50a0e09cbfb3
                                                                      • Instruction Fuzzy Hash: AA21F3B5600205ABCF21BFB58DC4AFD77A9AF98314F044065FD89DB14ADB3998099FB0
                                                                      APIs
                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 01012134
                                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 01012140
                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0101214F
                                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 01012156
                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0101216C
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                      • String ID:
                                                                      • API String ID: 44706859-0
                                                                      • Opcode ID: 75a15c96e0a9cebcd2b7f06ea3c7ee263345fb25e70cb6bee6a6e0196042cbd0
                                                                      • Instruction ID: 1e559eefb4be3c91ad19e0e9647df9b93ea93d5b9776edb704bd096aa94bb373
                                                                      • Opcode Fuzzy Hash: 75a15c96e0a9cebcd2b7f06ea3c7ee263345fb25e70cb6bee6a6e0196042cbd0
                                                                      • Instruction Fuzzy Hash: 64F062B9240301BBD7224FA8ED89F563BBDEF99661F200414FE85C7254CA79D8108B60
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 010441D8
                                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 010441E8
                                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 0104420E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$MoveWindow
                                                                      • String ID: Listbox
                                                                      • API String ID: 3315199576-2633736733
                                                                      • Opcode ID: abfeecf4fd0da4891d16a67004f8d223b68a795bc1360655aacf8cfda1c70cfd
                                                                      • Instruction ID: 340ba52a414c3daf0eab058193cf59afa06b982c076faca210802829e5f48b33
                                                                      • Opcode Fuzzy Hash: abfeecf4fd0da4891d16a67004f8d223b68a795bc1360655aacf8cfda1c70cfd
                                                                      • Instruction Fuzzy Hash: 2C21B0B2610118BBEF128E58CCC5FBB37AEEF89754F018124FA849B1A1C6719C52C7A0
                                                                      APIs
                                                                      • ClientToScreen.USER32(011CF830,?), ref: 01048061
                                                                      • GetWindowRect.USER32(?,?), ref: 010480D7
                                                                      • PtInRect.USER32(?,?,01049573), ref: 010480E7
                                                                      • MessageBeep.USER32(00000000), ref: 01048153
                                                                      Memory Dump Source
                                                                      • Source File: 00000037.00000002.1571934174.0000000000FB1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00FB0000, based on PE: true
                                                                      • Associated: 00000037.00000002.1571900416.0000000000FB0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.000000000104D000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572077982.0000000001071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572187023.000000000107D000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                      • Associated: 00000037.00000002.1572232042.0000000001085000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_55_2_fb0000_file.jbxd
                                                                      Similarity
                                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                                      • String ID:
                                                                      • API String ID: 1352109105-0
                                                                      • Opcode ID: e030333c2a654c9e169045a7009280a7e2e758e94a9d09139aff2318e734b59a
                                                                      • Instruction ID: b97ec4f36cd4280a76c3c9f0c38c748ae358ae8003bf97749ba142e33791929c
                                                                      • Opcode Fuzzy Hash: e030333c2a654c9e169045a7009280a7e2e758e94a9d09139aff2318e734b59a
                                                                      • Instruction Fuzzy Hash: 0E4180B4A00219DFDB21CFD8C4C5AA9BBF9FB49710F0485B7EAD49B265C735A841CB50